Author of the publication

Exploring an application-oriented land-based hyperspectral target detection framework based on 3D-2D CNN and transfer learning.

, , , , and . EURASIP J. Adv. Signal Process., 2024 (1): 37 (December 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The influence of a seed drop tube of the inside-filling air-blowing precision seed-metering device on seeding quality., , , , and . Comput. Electron. Agric., (2023)FRSM: A Novel Fault-Tolerant Approach for Redundant-Path-Enabled Service Migration in Mobile Edge Computing., , , , , , , , and . ICWS, volume 13736 of Lecture Notes in Computer Science, page 1-12. Springer, (2022)An Evolutionary Game-based Approach to Vehicular Task Offloading in An MEC Environment., , , , and . ICNSC, page 1-6. IEEE, (2023)Bionic threshing component optimized based on MBD-DEM coupling simulation significantly improves corn kernel harvesting rate., , , , and . Comput. Electron. Agric., (September 2023)Diamond NV Centers Based Quantum Sensor Using a VCO Integrated With Filtering Antenna., , , , , , , , , and . IEEE Trans. Instrum. Meas., (2022)A Multi-Armed Bandits Learning-Based Approach to Service Caching in Edge Computing Environment., , , , , , , and . ICWS, volume 14209 of Lecture Notes in Computer Science, page 3-17. Springer, (2023)Towards an Improved Bi-GAN-Based End-to-End One-Class Classifier for Anomaly Detection in Cloud Data-Centers., , , , and . ICWS, volume 13736 of Lecture Notes in Computer Science, page 30-40. Springer, (2022)Effectively Detecting Operational Anomalies In Large-Scale IoT Data Infrastructures By Using A GAN-Based Predictive Model., , , , , , and . Comput. J., 65 (11): 2909-2925 (2022)An integrated scheduling framework for synchronizing harvesting and straw returning., , , , and . Comput. Electron. Agric., (2021)Research Review on the Application of Homomorphic Encryption in Database Privacy Protection., , , , , and . Int. J. Cogn. Informatics Nat. Intell., 15 (4): 1-22 (2021)