Author of the publication

Delineating Individual Trees from Lidar Data: A Comparison of Vector- and Raster-based Segmentation Approaches.

, , , and . Remote. Sens., 5 (9): 4163-4186 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Radiometric Cross-Calibration of Tiangong-2 MWI Visible/NIR Channels over Aquatic Environments using MODIS., , , , and . Remote. Sens., 10 (11): 1803 (2018)Impacts of Insufficient Observations on the Monitoring of Short- and Long-Term Suspended Solids Variations in Highly Dynamic Waters, and Implications for an Optimal Observation Strategy., , , , , and . Remote. Sens., 10 (2): 345 (2018)A Data-Driven Approach for Collision Risk Early Warning in Vessel Encounter Situations Using Attention-BiLSTM., , , , , and . IEEE Access, (2020)An Inverse-Occurrence Sampling Approach for Urban Flood Susceptibility Mapping., , , , , and . Remote. Sens., 15 (22): 5384 (November 2023)Predicting potential distributions of geographic events using one-class data: concepts and methods., , , and . Int. J. Geogr. Inf. Sci., 25 (10): 1697-1715 (2011)Stacking VAE with Graph Neural Networks for Effective and Interpretable Time Series Anomaly Detection., , , and . CoRR, (2021)An Overview of AI and Blockchain Integration for Privacy-Preserving., , , , , and . CoRR, (2023)StackVAE-G: An efficient and interpretable model for time series anomaly detection., , , , and . AI Open, (January 2022)Security Analysis of DeFi: Vulnerabilities, Attacks and Advances., , , and . Blockchain, page 488-493. IEEE, (2022)Evolving a Better Scheduler for Diffusion Models., , , and . PRICAI (2), volume 14326 of Lecture Notes in Computer Science, page 398-409. Springer, (2023)