Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Application of Penetration Attack Tree Model Oriented to Attack Resistance Test., , , and . CSSE (3), page 622-626. IEEE Computer Society, (2008)978-0-7695-3336-0.Communication Characteristics in the NAS Parallel Benchmarks., and . IASTED PDCS, page 724-729. IASTED/ACTA Press, (2002)Multi-Prototype Networks for Unconstrained Set-based Face Recognition., , , , , , , , and . IJCAI, page 4397-4403. ijcai.org, (2019)How much can sub-band virtual concatenation (VCAT) help static routing and spectrum assignment in elastic optical networks? (Invited)., and . ICCS, page 273-277. IEEE, (2014)Generalized alternating projection based total variation minimization for compressive sensing.. ICIP, page 2539-2543. IEEE, (2016)Compressive video microscope via structured illumination., and . ICIP, page 1589-1593. IEEE, (2016)Geographical and Topology Control based Opportunistic Routing for Ad Hoc Networks., , , and . CoRR, (2019)Joint Patch-Group Based Sparse Representation for Image Inpainting., , , , and . ACML, volume 95 of Proceedings of Machine Learning Research, page 145-160. PMLR, (2018)A Deep Generative Deconvolutional Image Model., , , , and . CoRR, (2015)Compressive Imaging Via One-Shot Measurements., and . ISIT, page 416-420. IEEE, (2018)