Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hybrid Frame Concealment Algorithm for H.264/AVC., and . IEEE Trans. Image Processing, 19 (1): 98-107 (2010)Single layer atom chip for magnetically trapping one-dimensional array of ultracold atoms, , , and . Chinese Physics B, 19 (8): 083205+ (Aug 1, 2010)Salient Object Detection via Google Image Retrieval., and . ICIG (1), volume 10666 of Lecture Notes in Computer Science, page 97-107. Springer, (2017)On the Maximization of Influence Over an Unknown Social Network., , , , , and . AAMAS, page 2279-2281. International Foundation for Autonomous Agents and Multiagent Systems, (2019)Cycle-IR: Deep Cyclic Image Retargeting., , , and . CoRR, (2019)An efficient framework for image/video inpainting., , and . Signal Process. Image Commun., 28 (7): 753-762 (2013)基于子带能熵比的语音端点检测算法 (Speech Endpoint Detection Algorithm Based on Sub-band Energy-entropy-ratio)., , , and . 计算机科学, 44 (5): 304-307 (2017)Anomaly Detection for Screw Tightening Timing Data with LSTM Recurrent Neural Network., , , , , and . MSN, page 348-352. IEEE, (2019)Replenishment decision and coordination contract in cluster supply chain., , , and . Ind. Manag. Data Syst., 119 (6): 1374-1399 (2019)Simulation of multi-echelon supply chain inventory transshipment models at different levels., and . Simulation, 94 (7): 563-575 (2018)