Author of the publication

Face super resolution based on parent patch prior for VLQ scenarios.

, , , , and . Multim. Tools Appl., 76 (7): 10231-10254 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Privacy Leakage Analysis of Android Third-Party Libraries., , and . ICDIS, page 275-280. IEEE, (2018)A portable TPM based on USB key., , and . ACM Conference on Computer and Communications Security, page 750-752. ACM, (2010)Distributed Adaptive Formation Tracking Control of Mobile Robots With Event-Triggered Communication and Denial-of-Service Attacks., , , and . IEEE Trans. Ind. Electron., 70 (4): 4077-4087 (2023)Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation., , , and . Inf. Sci., (2015)Realistic frontal face reconstruction using coupled complementarity of far-near-sighted face images., , , , , , and . Pattern Recognit., (2022)A Joint Denoising Learning Model for Weight Update Space-Time Diversity Method., , , and . Remote. Sens., 14 (10): 2430 (2022)Two-step superresolution approach for surveillance face image through radial basis function-partial least squares regression and locality-induced sparse representation., , , , and . J. Electronic Imaging, 22 (4): 041120 (2013)Modeling the evolution of temporal knowledge graphs with uncertainty., , and . CoRR, (2023)A Graph-Guided Reasoning Approach for Open-ended Commonsense Question Answering., , and . CoRR, (2023)Stop Reasoning! When Multimodal LLMs with Chain-of-Thought Reasoning Meets Adversarial Images., , , , , , , , and . CoRR, (2024)