Author of the publication

A Reliable Image-to-Video Person Re-identification Based on Feature Fusion.

, , , and . ACIIDS (1), volume 10751 of Lecture Notes in Computer Science, page 433-442. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Person Search by Queried Description in Vietnamese Natural Language., , , , , and . ACIIDS (Companion), volume 1178 of Communications in Computer and Information Science, page 469-480. Springer, (2020)A Reliable Image-to-Video Person Re-identification Based on Feature Fusion., , , and . ACIIDS (1), volume 10751 of Lecture Notes in Computer Science, page 433-442. Springer, (2018)Using bliss points to enhance direction based multi-objective algorithms., , and . KSE, page 1-6. IEEE, (2022)A combination of geometric buffer technique and ray based interactive methods for multi-objective evolutionary algorithms., and . KSE, page 141-145. IEEE, (2018)Estimating tropical forest stand volume using Sentinel-2A imagery., , , , , , , , and . IDSTA, page 130-137. IEEE, (2021)A dynamic selection strategy for classification based surrogate-assisted multi-objective evolutionary algorithms., , and . ICICT, page 52-58. IEEE, (2021)An Approach to Maintain the Balance between Exploitation and Exploration of the Evolutionary Process in Multi-objective Algorithms., , and . ICICT, page 29-34. IEEE, (2023)An interactive method for surrogate-assisted multi-objective evolutionary algorithms., , and . KSE, page 195-200. IEEE, (2020)An Enhanced Direction based Multi-objective Evolutionary Algorithms using Rank Sum., , and . ISCIT, page 150-155. IEEE, (2019)Impersonation Attack Detection in IoT Networks., , , , and . GLOBECOM, page 6061-6066. IEEE, (2022)