From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Domain Embedded Multi-model Generative Adversarial Networks for Image-based Face Inpainting., , , , , , , , и . CoRR, (2020)Robust audio watermarking algorithm resisting cropping based on SIFT transform., , , , , , , и . Multim. Tools Appl., 83 (14): 40657-40676 (апреля 2024)M-GFCC: Audio Copy-Move Forgery Detection Algorithm Based on Fused Features of MFCC and GFCC., , , , , и . IAIC (1), стр. 220-234. (2023)An efficient content authentication scheme in encrypted speech based on integer wavelet transform., , , и . APSIPA, стр. 1-8. IEEE, (2016)CAM-Guided Spatially Denormalization for Lesion Weakly-Supervised Localization., , , и . DSIT, стр. 1-6. IEEE, (2022)Multistage semantic-aware image inpainting with stacked generator networks., , , , , , , , и . Int. J. Intell. Syst., 37 (2): 1599-1617 (2022)TL-GAN: Generative Adversarial Networks with Transfer Learning for Mode Collapse (S)., , , , , и . SEKE, стр. 723-777. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2019)Robust geodesic based outlier detection for class imbalance problem., , , , и . Pattern Recognit. Lett., (2020)Outlier Detection Based on the Data Structure., , , , и . IJCNN, стр. 1-6. IEEE, (2018)Privacy Protection of Digital Speech Based on Homomorphic Encryption., , , и . ICCCS (1), том 10039 из Lecture Notes in Computer Science, стр. 365-376. (2016)