Author of the publication

Deep hashing with mixed supervised losses for image search.

, , , , , , and . ICME Workshops, page 507-512. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Indoor Trajectory Tracking Scheme Based on Delaunay Triangulation and Heuristic Information in Wireless Sensor Networks., , , , and . Sensors, 17 (6): 1275 (2017)A New Multiple Kernel Approach for Visual Concept Learning., , , , and . MMM, volume 5371 of Lecture Notes in Computer Science, page 250-262. Springer, (2009)Model-Guided Multi-Path Knowledge Aggregation for Aerial Saliency Prediction., , , , and . IEEE Trans. Image Process., (2020)Masked Face Recognition with Latent Part Detection., , , , and . ACM Multimedia, page 2281-2289. ACM, (2020)Multimedia Intelligence: When Multimedia Meets Artificial Intelligence., , , and . ACM Multimedia, page 4775-4776. ACM, (2020)Guest Editorial Multimedia: The Biggest Big Data., , , and . IEEE Trans. Multim., 17 (9): 1401-1403 (2015)Multiple Expert Brainstorming for Domain Adaptive Person Re-Identification., , , , , and . ECCV (7), volume 12352 of Lecture Notes in Computer Science, page 594-611. Springer, (2020)Two-phase Web site classification based on Hidden Markov Tree models., , and . Web Intell. Agent Syst., 2 (4): 249-264 (2004)Societally connected multimedia across cultures., , , , , , , , , and 7 other author(s). J. Zhejiang Univ. Sci. C, 13 (12): 875-880 (2012)Similarity Analysis of Ransomware Attacks Based on ATT&CK Matrix., , and . IEEE Access, (2023)