Tao Ku
Orcid: 0000-0002-6250-0639
According to our database1,
Tao Ku
authored at least 27 papers
between 2008 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Comput. Graph., October, 2023
2022
Ind. Robot, 2022
2021
IEEE Trans. Circuits Syst. Video Technol., 2021
Sci. Program., 2021
2020
UDC 2020 Challenge on Image Restoration of Under-Display Camera: Methods and Results.
CoRR, 2020
Comput. Graph., 2020
UDC 2020 Challenge on Image Restoration of Under-Display Camera: Methods and Results.
Proceedings of the Computer Vision - ECCV 2020 Workshops, 2020
Proceedings of the Computer Vision - ECCV 2020 Workshops, 2020
Handling Constrained Multi-Objective optimization with Objective Space Mapping to Decision Space Based on Extreme Learning Machine.
Proceedings of the IEEE Congress on Evolutionary Computation, 2020
2019
Collaborative Mobile Crowdsensing in Opportunistic D2D Networks: A Graph-based Approach.
ACM Trans. Sens. Networks, 2019
2018
Proceedings of the 24th International Conference on Pattern Recognition, 2018
Multi-objective Artificial Bee Colony Algorithm with Information Learning for Model Optimization of Extreme Learning Machine.
Proceedings of ELM 2018, 2018
2017
Moving Destination Prediction Using Sparse Dataset: A Mobility Gradient Descent Approach.
ACM Trans. Knowl. Discov. Data, 2017
Proceedings of the 20th International Conference on Information Fusion, 2017
2016
Neurocomputing, 2016
2014
Int. J. Distributed Sens. Networks, 2014
2013
Knowl. Based Syst., 2013
J. Comput., 2013
2011
2010
Int. J. Adv. Comp. Techn., 2010
Integrated optimization model for three-layer distribution network design and its solution algorithm.
Proceedings of the 3rd International Conference on Information Sciences and Interaction Sciences (ICIS 2010), 2010
2008
Proceedings of the PACIIA 2008, 2008
Proceedings of the Enterprise Interoperability III, 2008
A Novel Complex Event Mining Network for RFID-Enable Supply Chain Information Security.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
Proceedings of the IEEE Congress on Evolutionary Computation, 2008