Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-preserving multi-authority attribute-based encryption with dynamic policy updating in PHR., , , and . Comput. Sci. Inf. Syst., 16 (3): 831-847 (2019)PCF-GAN: generating sequential data via the characteristic function of measures on the path space., , and . CoRR, (2023)Conditional Sig-Wasserstein GANs for Time Series Generation., , , , and . CoRR, (2020)Part-Aware Transformer for Generalizable Person Re-identification., , , and . CoRR, (2023)Recurrent Neural Network Based Language Model Adaptation for Accent Mandarin Speech., , , and . CCPR (2), volume 663 of Communications in Computer and Information Science, page 607-617. (2016)Meta Distribution Alignment for Generalizable Person Re-Identification., , , , , and . CVPR, page 2477-2486. IEEE, (2022)Robust Multiple Minutiae Partitions for Fingerprint Authentication., , , and . ISBAST, page 35-44. IEEE Computer Society, (2012)Improving accented Mandarin speech recognition by using recurrent neural network based language model adaptation., , , , and . ISCSLP, page 1-5. IEEE, (2016)Development trends of embedded NVM technology., , , and . ASICON, page 6-11. IEEE, (2017)MR! super-resolution with two regularization parameters., , , and . ICSAI, page 901-905. IEEE, (2016)