Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-Negative Matrix Factorization with Constraints., and . AAAI, page 506-511. AAAI Press, (2010)PixelLink: Detecting Scene Text via Instance Segmentation., , , and . AAAI, page 6773-6780. AAAI Press, (2018)Transport Properties of Liquid Aluminum at High Pressure from Quantum Molecular Dynamics Simulations., and . ICCSA (6), volume 10409 of Lecture Notes in Computer Science, page 787-795. Springer, (2017)Energy-efficient opportunistic localization with indoor wireless sensor networks., , , , and . Comput. Sci. Inf. Syst., 8 (4): 973-990 (2011)Multi-Class Classification from Noisy-Similarity-Labeled Data., , , , , , , and . CoRR, (2020)Less is More: Understanding Word-level Textual Adversarial Attack via n-gram Frequency Descend., , , , , and . CoRR, (2023)Trusted connection architecture of Internet of Things oriented to perception layer., , , , , and . Int. J. Wirel. Mob. Comput., 12 (3): 224-231 (2017)Distance and similarity measures for dual hesitant fuzzy sets and their applications in pattern recognition., , , and . J. Intell. Fuzzy Syst., 29 (2): 731-745 (2015)基于决策树的被动操作系统识别技术研究 (Research of Passive OS Recognition Based on Decision Tree)., , and . 计算机科学, 43 (8): 79-83 (2016)Convolutional Embedding Makes Hierarchical Vision Transformer Stronger., , , , , and . ECCV (20), volume 13680 of Lecture Notes in Computer Science, page 739-756. Springer, (2022)