Author of the publication

NeuroSkinning: automatic skin binding for production characters with deep graph networks.

, , , , , and . ACM Trans. Graph., 38 (4): 114:1-114:12 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Weight and Sensitivity Based Variable Maximum Distance to Average Vector Algorithm for Wearable Sensor Data Privacy Protection., , , , , and . IEEE Access, (2019)Energy-Aware Dynamic Topology Control Algorithm for Wireless Ad Hoc Networks., , , , , and . GLOBECOM, page 208-212. IEEE, (2008)Congestion-Aware Routing Scheme based on Traffic Information in Sensor Networks., , and . Ad Hoc Sens. Wirel. Networks, 35 (3-4): 281-300 (2017)A multi-dimensional spam filtering framework based on threat intelligence., and . ISCID (1), page 158-162. IEEE, (2019)Information cascades prediction with attention neural network., , , , and . HCIS, (2020)A hybrid gene selection method based on gene scoring strategy and improved particle swarm optimization., , , , , and . BMC Bioinform., 20-S (8): 289:1-289:13 (2019)Invisible Mask: Practical Attacks on Face Recognition with Infrared., , , , , and . CoRR, (2018)Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models., , , , and . CoRR, (2022)Siam Deep Feature KCF Method and Experimental Study for Pedestrian Tracking., , , , and . Sensors, 23 (1): 482 (2023)Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests., , , , , , , and . USENIX Security Symposium, page 17-34. USENIX Association, (2022)