Author of the publication

Self-supervised Indoor 360-Degree Depth Estimation via Structural Regularization.

, , , , , and . PRICAI (3), volume 13631 of Lecture Notes in Computer Science, page 438-451. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cloud computing and its key techniques, , and . Computer Science and Automation Engineering (CSAE), 2011 IEEE International Conference on, 2, page 404 -410. (June 2011)Comparison of electron transporting layer in white OLED with a double emissive layer structure., , , and . Displays, 33 (4-5): 191-194 (2012)Simulation run allocation for optimization of order-up-to level configuration in a complex logistics., , , and . BIC-TA, page 46-50. IEEE, (2010)Ag dendrite formed on the Cu pyramids as SERS substrate., , and . ASICON, page 1-3. IEEE, (2013)Fast Focal Point Correction in Prism-Coupled Total Internal Reflection Scanning Imager Using an Electronically Tunable Lens., , , , , , , , and . Sensors, 18 (2): 524 (2018)Poster: a framework for instant mobile web browsing with smart prefetching and caching., , , , and . MobiCom, page 367-370. ACM, (2014)The updating strategy for the safe control Bayesian network model under the abnormity in the thickening process of gold hydrometallurgy., , , and . Neurocomputing, (2019)Algorithms for Replica Placement and Update in Tree Network., , , , , and . Comput. J., 61 (2): 273-287 (2018)A comparative study for biomedical named entity recognition., , and . Int. J. Machine Learning & Cybernetics, 9 (3): 373-382 (2018)Analytic model on data security in VANETs., , , , , , and . ISCIT, page 1-6. IEEE, (2017)