Author of the publication

Research on Algorithms of Face Detection and Recognition across Cameras.

, , , , and . ICIIP, page 202-210. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel Architecture Implementation of Spectrum Sensing Based on Covariance in Cognitive Radio., , , and . ICFCE, volume 133 of Advances in Intelligent and Soft Computing, page 717-725. Springer, (2011)Modulated Model-Free Predictive Control With Minimum Switching Losses for PMSM Drive System., , , , and . IEEE Access, (2020)An Events Rearrangement Strategy-Based Robust Principle Component Analysis., , and . IEEE Geosci. Remote. Sens. Lett., 14 (6): 881-885 (2017)Trustworthy Dynamic Target Detection and Automatic Monitor Scheme for Mortgage Loan with Blockchain-Based Smart Contract., , and . BlockSys, volume 1267 of Communications in Computer and Information Science, page 415-427. Springer, (2020)Determining the Applicability of Advice for Efficient Multi-Agent Reinforcement Learning., , and . PRICAI, volume 11013 of Lecture Notes in Computer Science, page 343-351. Springer, (2018)Synchronization for dynamic complex networks combining degree distribution and eigenvector criteria., , and . Wirel. Networks, 29 (5): 2261-2278 (July 2023)Space Physical Sensor Protection and Control System Based on Neural Network Prediction: Application in Princess Elizabeth Area of Antarctica., , , and . Sensors, 20 (17): 4662 (2020)MIMO Radar Nonideal Orthogonal Waveforms Separation via Compressive Sensing., , , and . ACAI, page 5:1-5:6. ACM, (2018)Dynamic Feed-Forward LSTM., , and . KSEM (1), volume 14117 of Lecture Notes in Computer Science, page 191-202. Springer, (2023)Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree., , , , and . USENIX Security Symposium, page 6435-6451. USENIX Association, (2023)