Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Customized meta-dataset for automatic classifier accuracy evaluation., , , , , , and . Pattern Recognit., (February 2024)Enhancing Person Re-Identification Performance Through In Vivo Learning., , , , , and . IEEE Trans. Image Process., (2024)Meta Clothing Status Calibration for Long-Term Person Re-Identification., , , , , , and . IEEE Trans. Image Process., (2024)ParaModel: a visual modeling and code skeleton generation system for programming parallel applications., , , , , and . ACM SIGPLAN Notices, 43 (4): 4-10 (2008)Visual Simulation of Anti-Terrorism Emergency Response Based on Unity3D., and . ICNSC, page 132-137. IEEE, (2019)IoT Based Door Lock Surveillance System Using Cryptographic Algorithms., , and . ICNSC, page 448-453. IEEE, (2019)The sequence and de novo assembly of the giant panda genome, , , , , , , , , and 113 other author(s). Nature, 463 (7279): 311--317 (January 2010)Chaos and rigorous verification of horseshoes in a class of Hopfield neural networks., , and . Neural Comput. Appl., 19 (1): 159-166 (2010)NANOPI: Extreme-Scale Actively-Secure Multi-Party Computation., , , and . ACM Conference on Computer and Communications Security, page 862-879. ACM, (2018)Hybrid game cross efficiency evaluation models based on interval data: A case of forest carbon sequestration., , , and . Expert Syst. Appl., (2022)