Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Client-based intrusion prevention system for 802.11 wireless LANs., and . WiMob, page 100-107. IEEE Computer Society, (2010)Retro Drug Design: From Target Properties to Molecular Structures., , , , , , , , , and . J. Chem. Inf. Model., 62 (11): 2659-2669 (2022)Learning a Key-Value Memory Co-Attention Matching Network for Person Re-Identification., , and . AAAI, page 9235-9242. AAAI Press, (2019)Photo Cropping via Deep Reinforcement Learning., , and . ICA, page 86-90. IEEE, (2019)Pyramid Person Matching Network for Person Re-identification., , , , and . ACML, volume 77 of Proceedings of Machine Learning Research, page 487-497. PMLR, (2017)Design of Morphing Wing Leading Edge with Compliant Mechanism., , , , , and . ICIRA (1), volume 11740 of Lecture Notes in Computer Science, page 382-392. Springer, (2019)Localizing Community Resilience within the Digital Humanities: Examples from the Penghu Archipelago., , and . DH, (2023)Data-Dependent Label Distribution Learning for Age Estimation., , , , , , , and . IEEE Trans. Image Process., 26 (8): 3846-3858 (2017)A Crowdsourcing Digital Forensics Platform for IoT Environments Powered by Blockchain., , , and . ICC, page 2016-2021. IEEE, (2024)Structure-Aware Slow Feature Analysis for Age Estimation., , , , , and . IEEE Signal Process. Lett., 23 (12): 1702-1706 (2016)