Author of the publication

Cloud removal using SAR and optical images via attention mechanism-based GAN.

, , , , and . Pattern Recognit. Lett., (November 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal control based push recovery strategy for the iCub humanoid robot with series elastic actuators., and . IROS, page 5846-5852. IEEE, (2017)Semantic-Parsing Based on Semantic Units Theory - a New Approach to Natural Languages Processing., , , and . IJPRAI, 22 (7): 1447-1459 (2008)Face Detection Using Bionic Cascaded Framework., , , , , and . ICCC, volume 11518 of Lecture Notes in Computer Science, page 79-90. Springer, (2019)Improved higher degree total variation (HDTV) regularization., and . ISBI, page 656-659. IEEE, (2012)Harmonizing model with transfer tax on water pollution across regional boundaries in a China's lake basin., , , , , , and . Eur. J. Oper. Res., 225 (2): 377-382 (2013)Giant complete automaton for uncertain multiple string matching and its high speed construction algorithm., , , and . Sci. China Inf. Sci., 54 (8): 1562-1571 (2011)Optimal Scheduling of Proactive Service with Customer Deterioration and Improvement., , and . Manag. Sci., 68 (4): 2533-2578 (2022)Supplementary Learning Control for Energy Management Strategy of Hybrid Electric Vehicles at Scale., , , , , , , and . IEEE Trans. Veh. Technol., 72 (6): 7290-7303 (June 2023)Who are the 'silent spreaders'?: contact tracing in spatio-temporal memory models., , , , and . Neural Comput. Appl., 34 (17): 14859-14879 (2022)On the security of multiple Huffman table based encryption., , , and . J. Vis. Commun. Image Represent., 22 (1): 85-92 (2011)