Author of the publication

Student-t Process Regression with Dependent Student-t Noise.

, , and . ECAI, volume 285 of Frontiers in Artificial Intelligence and Applications, page 82-89. IOS Press, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Keyword Proximity Search over Large and Complex RDF Database., , , , and . Web Intelligence, page 467-471. IEEE Computer Society, (2012)Improving Adversarial Robustness via Channel-wise Activation Suppressing., , , , , and . ICLR, OpenReview.net, (2021)Multi-document Summarization Based on Sentence Clustering., , , , and . ICONIP (2), volume 8835 of Lecture Notes in Computer Science, page 429-436. Springer, (2014)Motion-Aware Graph Reasoning Hashing for Self-supervised Video Retrieval., , , , and . BMVC, page 82. BMVA Press, (2022)Steward: smart edge based joint QoE optimization for adaptive video streaming., , , , , and . NOSSDAV, page 31-36. ACM, (2019)A customized and cost-efficient backup scheme in software-defined networks., , , , and . ICNP, page 1-6. IEEE Computer Society, (2017)Hijacking Tracker: A Powerful Adversarial Attack on Visual Tracking., , , , , and . ICASSP, page 2897-2901. IEEE, (2020)Improved Real-Time Visual Tracking via Adversarial Learning., , , and . ICASSP, page 1853-1857. IEEE, (2020)Deterministic constructions of binary measurement matrices with various sizes., , and . ICASSP, page 3641-3645. IEEE, (2015)Improving Query Efficiency of Black-Box Adversarial Attack., , , , , and . ECCV (25), volume 12370 of Lecture Notes in Computer Science, page 101-116. Springer, (2020)