Author of the publication

PointDoN: A Shape Pattern Aggregation Module for Deep Learning on Point Cloud.

, , , , , and . IJCNN, page 1-8. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Crucial area coverage of directional sensor networks with limited resource., , , , and . WCSP, page 1-5. IEEE, (2015)The Robust QCA Adder Designs Using Composable QCA Building Blocks., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 26 (1): 176-183 (2007)Algorithm level recomputing using allocation diversity: a registertransfer level approach to time redundancy-based concurrent errordetection., and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 21 (9): 1077-1087 (2002)Fixed-Priority Allocation and Scheduling for Energy-Efficient Fault Tolerance in Hard Real-Time Multiprocessor Systems., , , and . IEEE Trans. Parallel Distributed Syst., 19 (11): 1511-1526 (2008)Viewpoint Estimation for Workpieces with Deep Transfer Learning from Cold to Hot., , , , and . ICONIP (1), volume 11301 of Lecture Notes in Computer Science, page 21-32. Springer, (2018)SVMs multi-class loss feedback based discriminative dictionary learning for image classification., , , , , and . Pattern Recognit., (2021)Toward Building and Optimizing Trustworthy Systems Using Untrusted Components: A Graph-Theoretic Perspective., , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (5): 1386-1399 (2022)SNc Neuron Detection Method Based on Deep Learning for Efficacy Evaluation of Anti-PD Drugs., , , , and . ACC, page 1981-1986. IEEE, (2018)Concurrent error detection of fault-based side-channel cryptanalysis of 128-bit RC6 block cipher., , and . Microelectron. J., 34 (1): 31-39 (2003)Split Manufacturing-Based Register Transfer-Level Obfuscation., , , , and . ACM J. Emerg. Technol. Comput. Syst., 15 (1): 11:1-11:22 (2019)