Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VisualProg Distiller: Learning to Fine-tune Non-differentiable Visual Programming Frameworks., , , , , and . CoRR, (2023)A New Approach of Supply Chain Cost Modeling for Integrated Rail-post Package Distribution System in China., , and . LISS (2), page 147-153. SciTePress, (2011)EAACK - A Secure Intrusion-Detection System for MANETs., , and . IEEE Trans. Ind. Electron., 60 (3): 1089-1098 (2013)Linear quadratic regulator based on extended state observer-based active disturbance rejection control of autonomous vehicle path following control., , , , and . J. Syst. Control. Eng., 237 (1): 102-120 (2023)A Comprehensive Framework for Long-Tailed Learning via Pretraining and Normalization., , , and . IEEE Trans. Neural Networks Learn. Syst., 35 (3): 3437-3449 (March 2024)Best-of-Three Voting on Dense Graphs., and . SPAA, page 115-121. ACM, (2019)A Simple Model of Influence., , and . WAW, volume 13894 of Lecture Notes in Computer Science, page 164-178. Springer, (2023)Enhancing Latent Features for Unsupervised Video Anomaly Detection., , , , and . PRCV (2), volume 13020 of Lecture Notes in Computer Science, page 299-310. Springer, (2021)Detecting misbehaving nodes in MANETs., , and . iiWAS, page 216-222. ACM, (2010)CTTSR: A Hybrid CNN-Transformer Network for Scene Text Image Super-Resolution., , and . ICASSP, page 1-5. IEEE, (2023)