Author of the publication

Exploiting Attribute Dependency for Attribute Assignment in Crowded Scenes.

, , , , , and . IEEE Signal Process. Lett., 23 (10): 1325-1329 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Low Delay Task Scheduling Algorithm Based on Ant Colony System in Heterogeneous Environments., , , , , and . HPCC/DSS/SmartCity, page 519-524. IEEE, (2020)Area-efficient K-Nearest Neighbor Design using Stochastic Computing., , , and . ACSSC, page 782-786. IEEE, (2018)Semantic segmentation method of 3D liver image based on contextual attention model., , , and . SMC, page 3042-3049. IEEE, (2021)Surpass Teacher: Enlightenment Structured Knowledge Distillation of Transformer., and . SMC, page 5102-5107. IEEE, (2023)IMG-SMP: Algorithm and Hardware Co-Design for Real-time Energy-efficient Neural Motion Planning., , , , , and . ACM Great Lakes Symposium on VLSI, page 373-377. ACM, (2022)Hierarchical Deep Feature Representation for High-Resolution Scene Classification., , , , and . IGARSS, page 517-520. IEEE, (2019)Knowledge distillation based on decision boundary instances generated by DBI-GAN., , , , and . Neurocomputing, (2022)VLSI Hardware Architecture of Stochastic Low-rank Tensor Decomposition., , , , and . ACSCC, page 1176-1180. IEEE, (2021)Object Detection of NAO Robot Based on a Spectrum Model., and . ICIC (3), volume 10956 of Lecture Notes in Computer Science, page 327-338. Springer, (2018)Blockchain-Based Privacy Protection Unified Identity Authentication., , , , , , and . CyberC, page 42-49. IEEE, (2019)