Author of the publication

Knowledge Distillation for Lightweight 2D Single-Person Pose Estimation.

, , , , and . J. Circuits Syst. Comput., 32 (3): 2350050:1-2350050:16 (February 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chain-based big data access control infrastructure., , , , , , , , , and . J. Supercomput., 74 (10): 4945-4964 (2018)Point Cloud Adversarial Perturbation Generation for Adversarial Attacks., , , and . IEEE Access, (2023)Multireceiver Conditional Anonymous Singcryption for IoMT Crowdsourcing., , , , , , and . IEEE Internet Things J., 11 (5): 8401-8413 (2024)Hybrid Deep Neural Network-Based Cross-Modal Image and Text Retrieval Method for Large-Scale Data., , , , , and . J. Circuits Syst. Comput., 30 (1): 2150018:1-2150018:15 (2021)Knowledge Distillation for Lightweight 2D Single-Person Pose Estimation., , , , and . J. Circuits Syst. Comput., 32 (3): 2350050:1-2350050:16 (February 2023)Point-PC: Point Cloud Completion Guided by Prior Knowledge via Causal Inference., , , , , , and . CoRR, (2023)T2TD: Text-3D Generation Model based on Prior Knowledge Guidance., , , , and . CoRR, (2023)HTTP-Based APT Malware Infection Detection Using URL Correlation Analysis., , , , , , and . Secur. Commun. Networks, (2021)Achieving Secure Dynamic Searchable Symmetric Encryption for Data Sharing Services via Blockchain., , , and . CAIBDA, page 1-6. VDE / IEEE, (2022)Modeling Attack Process of Advanced Persistent Threat., , , , and . SpaCCS, volume 10066 of Lecture Notes in Computer Science, page 383-391. (2016)