Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Layered-based exposure fusion algorithm., , , and . IET Image Processing, 7 (7): 701-711 (2013)BUPTTeam Participation at TAC 2016 Knowledge Base Population., , and . TAC, NIST, (2016)Performance evaluation of distributing real-time video over concurrent multipath., , , , , and . WCNC, page 3001-3006. IEEE, (2009)Deeply supervised vestibule segmentation network for CT images with global context-aware pyramid feature extraction., , , , , and . IET Image Process., 17 (4): 1267-1279 (March 2023)MMPClust: A Skew Prevention Algorithm for Model-Based Document Clustering., , and . DASFAA, volume 3453 of Lecture Notes in Computer Science, page 536-547. Springer, (2005)Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack., , , , , and . CoRR, (2020)SAIR: Learning Semantic-aware Implicit Representation., , , and . CoRR, (2023)The Graph Limit of The Minimizer of The Onsager-Machlup Functional and Its Computation., , , and . CoRR, (2020)Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation., , , , and . USENIX Security Symposium, page 1739-1756. USENIX Association, (2023)Pseudo Period Detection on Time Series Stream with Scale Smoothing., , , , and . APWeb/WAIM, volume 5446 of Lecture Notes in Computer Science, page 611-616. Springer, (2009)