Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Combinatorial Optimization Analysis Method for Detecting Malicious Industrial Internet Attack Behaviors., , , , and . ACM Trans. Cyber Phys. Syst., 8 (1): 8:1-8:20 (January 2024)Spatiotemporal implicit neural representation for unsupervised dynamic MRI reconstruction., , , , , and . CoRR, (2023)Ageing and degeneration analysis using ageing-related dynamic attention on lateral cephalometric radiographs., , , , , , , , , and . npj Digit. Medicine, (2022)Parallel spiral search algorithm applied to integer motion estimation., , , , , , and . Signal Process. Image Commun., (2021)Security, Trust and Risk in Multimedia Social Networks.. Comput. J., 58 (4): 515-517 (2015)Lightweight Bimodal Rail Surface Defect Detection Method: Parallel-YOLOv4-Tiny., , , , , , and . ICVIP, page 98-103. ACM, (2021)GCRNet: Global Context Relation Network for Weakly-Supervised Temporal Action Localization: Identify the target actions in a long untrimmed video and find the corresponding action start point and end point., , , , and . ICVIP, page 184-190. ACM, (2021)Combine Object Detection with Skeleton-Based Action Recognition to Detect Smoking Behavior., , , , , , , and . ICVIP, page 111-116. ACM, (2021)Detecting Malicious Social Bots Based on Clickstream Sequences., , and . IEEE Access, (2019)Introduction to the special section on Recent Trends in Embedded Technologies and Wearable Systems: Computational Intelligence Solutions., , and . Comput. Electr. Eng., (2017)