Author of the publication

Multi-scale Generative Adversarial Networks for Crowd Counting.

, , and . ICPR, page 3244-3249. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correction to: New scheme for measurement-device-independent quantum key distribution., , , , and . Quantum Inf. Process., 18 (1): 12 (2019)A Combination of Joint Sparse Form and Frobenius Map in Scalar Multiplication of Elliptic Curve over GF(2^mn )., , , , and . DBTA, page 707-710. IEEE Computer Society, (2009)A generalization of parameterized inexact Uzawa method for generalized saddle point problems., and . Appl. Math. Comput., 215 (2): 599-607 (2009)Speeding Scalar Multiplication of Elliptic Curve over GF(2mn)., , , , and . Int. J. Netw. Secur., 11 (2): 70-77 (2010)On HSS-based constraint preconditioners for generalized saddle-point problems., , and . Numer. Algorithms, 57 (2): 273-287 (2011)A Quasi-Dynamic Video Conference Resource Backup Strategy Based on Cloud., , , , and . CyberC, page 368-371. IEEE, (2016)Route Coverage Testing for Autonomous Vehicles via Map Modeling., , , , , , and . ICRA, page 11450-11456. IEEE, (2021)Automating inference for non-standard models.. University of Oxford, UK, (2020)British Library, EThOS.An Attention-Based 3D CNN With Multi-Scale Integration Block for Alzheimer's Disease Classification., , , , and . IEEE J. Biomed. Health Informatics, 26 (11): 5665-5673 (2022)基于Wine的Windows安全机制模拟及沙箱系统实现 (Windows Security Mechanisms Simulation and Sandbox System Implementation Based on Wine)., , , and . 计算机科学, 44 (11): 246-252 (2017)