Author of the publication

3D Model Generation and Reconstruction Using Conditional Generative Adversarial Network.

, , , and . Int. J. Comput. Intell. Syst., 12 (2): 697-705 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Random subspace evidence classifier., , , and . Neurocomputing, (2013)A Low-Signal-to-Noise Ratio Estimation Algorithm for Multipath Channels., , , and . Ingénierie des Systèmes d Inf., 25 (2): 253-258 (2020)Common Green Plants Recognition Based on Wavelet Transformation and Varied Local Edge Patterns., , , and . Int. J. Pattern Recognit. Artif. Intell., 32 (12): 1850045:1-1850045:14 (2018)Generation of 2D Conforming Voronoi Diagram in Complex Domain., , , and . ICAIC (4), volume 227 of Communications in Computer and Information Science, page 32-39. Springer, (2011)Design of Distributed Fractional Order PID Type Dynamic Matrix Controller for Large-Scale Process Systems., , and . IEEE Access, (2020)Colorful 3D reconstruction at high resolution using multi-view representation., , , , and . J. Vis. Commun. Image Represent., (2022)Lightweight ship detection method based on Swin-YOLOFormer., , , , , , and . J. Electronic Imaging, (2024)ST-VQA: shrinkage transformer with accurate alignment for visual question answering., , , and . Appl. Intell., 53 (18): 20967-20978 (September 2023)HT-Net: hierarchical context-attention transformer network for medical ct image segmentation., , , , and . Appl. Intell., 52 (9): 10692-10705 (2022)Security Aware Virtual Network Embedding Algorithm Using Information Entropy TOPSIS., , , , , and . J. Netw. Syst. Manag., 28 (1): 35-57 (2020)