Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly detection based on Nearest Neighbor search with Locality-Sensitive B-tree., , and . Neurocomputing, (2018)Anomaly Detection by Analyzing the Pedestrian Behavior and the Dynamic Changes of Behavior., , and . ICIC (1), volume 10361 of Lecture Notes in Computer Science, page 211-222. Springer, (2017)Augmenting Legacy Networks for Flexible Inference., , , , and . IV, page 1-8. IEEE, (2023)HALP: Hardware-Aware Latency Pruning., , , , , and . CoRR, (2021)Structural Pruning via Latency-Saliency Knapsack., , , , , and . NeurIPS, (2022)Crowd counting estimation in video surveillance based on linear regression function., , , and . CISP-BMEI, page 60-65. IEEE, (2016)Global Vision Transformer Pruning with Hessian-Aware Saliency., , , , , and . CVPR, page 18547-18557. IEEE, (2023)When to Prune? A Policy towards Early Structural Pruning., , , and . CoRR, (2021)Hardware-Aware Latency Pruning for Real-Time 3D Object Detection., , , , , , , and . IV, page 1-6. IEEE, (2023)Soft Masking for Cost-Constrained Channel Pruning., , , , and . ECCV (11), volume 13671 of Lecture Notes in Computer Science, page 641-657. Springer, (2022)