Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Certificateless Verifiable Strong Designated Verifier Signature Scheme., , , , , , , , and . IEEE Access, (2019)Deep learning on digital mammography for expert-level diagnosis accuracy in breast cancer detection., , , , , , and . Multim. Syst., 28 (4): 1263-1274 (2022)Automatic interior layout with user-specified furniture., , , , and . Comput. Graph., (2021)Automatic Furniture Layout Based on Functional Area Division., , , , and . CW, page 109-116. IEEE, (2019)A novel holes filling method based on layered depth map and patch sparsity for complex-scene images., , , , and . Microelectron. J., (2021)Void Hole Avoidance Based on Sink Mobility and Adaptive Two Hop Vector-Based Forwarding in Underwater Wireless Sensor Networks., , , and . Wirel. Pers. Commun., 120 (2): 1417-1447 (2021)HSE: Hybrid Species Embedding for Deep Metric Learning., , , , , and . ICCV, page 11013-11023. IEEE, (2023)A real-time collision detection algorithm for mobile billiards game., , and . Advances in Computer Entertainment Technology, page 294-297. ACM, (2005)Joint temporal context exploitation and active learning for video segmentation., , , , , and . Pattern Recognit., (2020)Real time violence detection in surveillance videos using Convolutional Neural Networks., , , , and . Multim. Tools Appl., 81 (26): 38151-38173 (2022)