Author of the publication

E-D-Net: Automatic Building Extraction From High-Resolution Aerial Images With Boundary Information.

, , , , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reinforcement learning-based algorithm for efficient and adaptive forwarding in named data networking., , , and . ICCC, page 1-6. IEEE, (2017)An Interval Intuitionistic Fuzzy VIKOR Evaluation Method Based on Unknown Weight., , , , and . ICNC-FSKD, volume 1074 of Advances in Intelligent Systems and Computing, page 836-844. Springer, (2019)A Multi-attribute Decision Making Method Based on Interval Pythagorean Fuzzy Language and the PROMETHEE Method., , , , and . ICNC-FSKD, volume 1074 of Advances in Intelligent Systems and Computing, page 818-826. Springer, (2019)LOCP: Latency-optimized channel pruning for CNN inference acceleration on GPUs., , , , , , , , and . J. Supercomput., 79 (13): 14313-14341 (September 2023)Self-supervised Noise2noise Method Utilizing Corrupted Images with a Modular Network for LDCT Denoising., , , and . CoRR, (2023)Privacy-Preserving Supervisory Control of Discrete-Event Systems via Co-Synthesis of Edit Function and Supervisor for Opacity Enforcement and Requirement Satisfaction., , , and . CoRR, (2021)Synthesis of Covert Sensor Attacks in Networked Discrete-Event Systems with Non-FIFO Channels., , , and . CoRR, (2021)Synthesis of Maximally Permissive Covert Attackers Against Unknown Supervisors by Using Observations., , , and . CoRR, (2021)Synthesis of Actuator Attackers for Free., , and . CoRR, (2019)Observation-Assisted Heuristic Synthesis of Covert Attackers Against Unknown Supervisors., , , and . CoRR, (2021)