Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NeuralWalk: Trust Assessment in Online Social Networks with Neural Networks., , and . INFOCOM, page 1999-2007. IEEE, (2019)Super-Resolution for Hyperspectral Remote Sensing Images Based on the 3D Attention-SRGAN Network., , , and . Remote. Sens., 12 (7): 1204 (2020)Transparent Component Defect Detection Method Based on Improved YOLOv7 Algorithm., , , , and . Int. J. Pattern Recognit. Artif. Intell., 37 (14): 2350030:1-2350030:25 (November 2023)Foreground Extraction Combining Graph Cut and Histogram Shape Analysis., , , , and . IEEE Access, (2019)Decoupled-and-Coupled Networks: Self-Supervised Hyperspectral Image Super-Resolution With Subpixel Fusion., , , , , and . IEEE Trans. Geosci. Remote. Sens., (2023)HyperSINet: A Synergetic Interaction Network Combined With Convolution and Transformer for Hyperspectral Image Classification., , , , , and . IEEE Trans. Geosci. Remote. Sens., (2024)NDARTS: A Differentiable Architecture Search Based on the Neumann Series., , , and . Algorithms, 16 (12): 536 (2023)Low-Rank Representations Meets Deep Unfolding: A Generalized and Interpretable Network for Hyperspectral Anomaly Detection., , , , and . CoRR, (2024)Intrinsic motivation enhances online group creativity via promoting members' effort, not interaction., , , and . Br. J. Educ. Technol., 52 (2): 606-618 (2021)Unmasking Role-Play Attack Strategies in Exploiting Decentralized Finance (DeFi) Systems., , , , , , , and . DeFi@CCS, page 33-39. ACM, (2023)