Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Authentication-Key Re-assignment for Reliable Report Delivery., , and . MASS, page 467-476. IEEE Computer Society, (2006)Learning to Extract Building Footprints from Off-Nadir Aerial Images., , , , , and . CoRR, (2022)A Modified Differential Evolution Algorithm for Resource Constrained Multi-project Scheduling Problem., , , , and . J. Comput., 9 (8): 1922-1927 (2014)OmniCity: Omnipotent City Understanding with Multi-level and Multi-view Images., , , , , , , and . CoRR, (2022)Net 1.6 Tbps O-band Coherent Transmission over 10 km Using a TFLN IQM and DFB Lasers for Carrier and LO., , , , , , and . OFC, page 1-3. IEEE, (2023)3D Building Reconstruction from Monocular Remote Sensing Images., , , , , and . ICCV, page 12528-12537. IEEE, (2021)Battery equalization based on state of charge., , , , , and . ICSAI, page 159-163. IEEE, (2014)A Nanosecond-Level Hybrid Table Design for Financial Market Data Generators., , , , and . FCCM, page 227-234. IEEE Computer Society, (2017)VIGC: Visual Instruction Generation and Correction., , , , , , , , , and 1 other author(s). AAAI, page 5309-5317. AAAI Press, (2024)Locating Compromised Sensor Nodes Through Incremental Hashing Authentication., , , and . DCOSS, volume 4026 of Lecture Notes in Computer Science, page 321-337. Springer, (2006)