Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

End-to-End Hand Mesh Recovery From a Monocular RGB Image., , , , and . ICCV, page 2354-2364. IEEE, (2019)A High-Security and Smart Interaction System Based on Hand Gesture Recognition for Internet of Things., , and . Secur. Commun. Networks, (2018)Line covering method and its applications in steganography and steganalysis., , , and . Int. J. Multim. Intell. Secur., 3 (1): 1-22 (2013)Question type and answer related keywords aware question generation., , , and . J. Intell. Fuzzy Syst., 42 (5): 4611-4622 (2022)Reversible Video Watermarking Using Motion Estimation and Prediction Error Expansion., , , and . J. Inf. Sci. Eng., 27 (2): 465-479 (2011)3D object retrieval with stacked local convolutional autoencoder., , , and . Signal Process., (2015)Surface defect detection of solar cell based on similarity non-maximum suppression mechanism., , , , , , and . Signal Image Video Process., 17 (5): 2583-2593 (July 2023)Rib fracture detection in chest CT image based on a centernet network with heatmap pyramid structure., , , and . Signal Image Video Process., 17 (5): 2343-2350 (July 2023)Cross-domain video concept detection: A joint discriminative and generative active learning approach., , , , and . Expert Syst. Appl., 39 (15): 12220-12228 (2012)A General Framework to Understand Vulnerabilities in Information Systems., , , , and . IEEE Access, (2020)