Author of the publication

ACAV100M: Automatic Curation of Large-Scale Datasets for Audio-Visual Video Representation Learning.

, , , , , , and . ICCV, page 10254-10264. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A 16Gb 1.2V 3.2Gb/s/pin DDR4 SDRAM with improved power distribution and repair strategy., , , , , , , , , and 15 other author(s). ISSCC, page 212-214. IEEE, (2018)Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability., , , , , and . USENIX Security Symposium, page 391-408. USENIX Association, (2023)Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing., , , , , and . USENIX Security Symposium, page 557-574. USENIX Association, (2017)A 3-D real-time simulation for autonomous driving with V2V communications., , and . ICCVE, page 800-801. IEEE, (2013)The Kirsch-Laplacian edge detection algorithm for predicting iris-based desease., , and . CSCWD, page 551-555. IEEE, (2017)A batch rekeying time decision algorithm for IPTV systems., and . CCNC, page 901-905. IEEE, (2011)CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks., , and . ACM Conference on Computer and Communications Security, page 793-804. ACM, (2015)Analysis of Constrained Optimization Problems by the SCE-UA with an Adaptive Penalty Function., and . J. Comput. Civ. Eng., (2016)Localization with a mobile beacon based on geometric constraints in wireless sensor networks., , , and . IEEE Trans. Wirel. Commun., 8 (12): 5801-5805 (2009)Evaluation System for Defense IT Project in Korea: Post-Implementation Stage., and . J. Multim. Inf. Syst., 5 (4): 291-297 (2018)