Author of the publication

Improved Wavelet Feature Extraction Methods Based on HSV Space for Vehicle Detection.

, , , , and . MVA, page 376-379. (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Ranking Strategy in Hybrid Peer-to-Peer Networks., , , , and . WAIM, volume 3739 of Lecture Notes in Computer Science, page 731-736. Springer, (2005)Fairness with adaptive weight in network attack detection., , , , , and . ICPADS, page 1327-1333. IEEE, (2023)Revisiting Graph-Based Fraud Detection in Sight of Heterophily and Spectrum., , , , , and . AAAI, page 9214-9222. AAAI Press, (2024)TBDetector: Transformer-Based Detector for Advanced Persistent Threats with Provenance Graph., , , , , , , , and . CoRR, (2023)Improved Haar Wavelet Feature Extraction Approaches for Vehicle Detection., , , , , and . ITSC, page 1050-1053. IEEE, (2007)Few-shot Message-Enhanced Contrastive Learning for Graph Anomaly Detection., , , , , and . ICPADS, page 288-295. IEEE, (2023)A Study on Data Parallel Optimization for Real-time Vehicle Recognition Algorithm., , , and . ITSC, page 661-665. IEEE, (2007)CSDA: a novel cluster-based secure data aggregation scheme for WSNs., , , and . Clust. Comput., 22 (Supplement): 5233-5244 (2019)TOP-k Query Calculation in Peer-to-Peer Networks., , , , and . ASIAN, volume 3818 of Lecture Notes in Computer Science, page 127-135. Springer, (2005)Design of a Distributed P2P-Based Grid Content Management Architecture., , , , and . CNSR, page 339-344. IEEE Computer Society, (2005)