From post

Covered Face Recognition Based on Deep Convolution Generative Adversarial Networks.

, , и . ICAIS (1), том 12239 из Lecture Notes in Computer Science, стр. 133-141. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Time and Energy Saving-Based Frame Adjustment Strategy (TES-FAS) Tag Identification Algorithm for UHF RFID Systems., , , , и . IEEE Trans. Wirel. Commun., 19 (5): 2974-2986 (2020)Achieving Lightweight Image Steganalysis with Content-Adaptive in Spatial Domain., , , и . ICIG (1), том 12888 из Lecture Notes in Computer Science, стр. 641-653. Springer, (2021)(t, n) Threshold secret image sharing scheme with adversary structure., , , , и . Multim. Tools Appl., 76 (20): 21193-21210 (2017)Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud., , , , и . IJWGS, 14 (1): 21-43 (2018)Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing., , , , и . IPCCC, стр. 1-8. IEEE Computer Society, (2013)Spatial-frequency gradient fusion based model augmentation for high transferability adversarial attack., , , , и . Knowl. Based Syst., (2024)Writing in the Air with WiFi Signals for Virtual Reality Devices., , , , и . IEEE Trans. Mob. Comput., 18 (2): 473-484 (2019)New Forensic Methods for OOXML Format Documents., , , и . IWDW, том 8389 из Lecture Notes in Computer Science, стр. 503-513. Springer, (2013)WolfPath: Accelerating Iterative Traversing-Based Graph Processing Algorithms on GPU., , , , , , , и . Int. J. Parallel Program., 47 (4): 644-667 (2019)HGA: Hierarchical Feature Extraction With Graph and Attention Mechanism for Linguistic Steganalysis., , , и . IEEE Signal Process. Lett., (2022)