Author of the publication

A Facial Expression Recognition Method Using Two-Stream Convolutional Networks in Natural Scenes.

. J. Inf. Process. Syst., 17 (2): 399-410 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Facial Expression Recognition Method Using Two-Stream Convolutional Networks in Natural Scenes.. J. Inf. Process. Syst., 17 (2): 399-410 (2021)Fast prediction unit partition mode selection for high-efficiency video coding intercoding using motion homogeneous coding units., , and . J. Electronic Imaging, 24 (6): 063024 (2015)Building Trust in Container Environment., , , , , and . TrustCom/BigDataSE, page 1-9. IEEE, (2019)LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining., , , , , and . MILCOM, page 292-297. IEEE, (2022)MemInspect: Memory Forensics for investigating Fileless Attacks., , , , , , and . TrustCom, page 946-955. IEEE, (2023)Perception of MOOC Pedagogical Tools and Learners' Learning Styles in MOOC Blended Teaching: a Case Study., , , and . ICEBT, page 1-6. ACM, (2019)Research and Application of High Precision Machining Technology for Super-Large Integral Frame Parts of Aluminum Alloy., , , , and . MLIS, volume 332 of Frontiers in Artificial Intelligence and Applications, page 80-88. IOS Press, (2020)A Study on the Factors Influencing the Participation of Face-to-Face Discussion and Online Synchronous Discussion in Class., , , and . ITS, volume 12149 of Lecture Notes in Computer Science, page 184-195. Springer, (2020)Research on the Enhancement of VANET Coverage Based on UAV., , , and . CSPS, volume 571 of Lecture Notes in Electrical Engineering, page 787-795. Springer, (2019)DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting., , , , and . SecureComm (1), volume 398 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-24. Springer, (2021)