Author of the publication

Semantic Locality-Aware Deformable Network for Clothing Segmentation.

, , , , , , and . IJCAI, page 764-770. ijcai.org, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Workload Prediction in Edge Computing based on Graph Neural Network., , , , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 1663-1666. IEEE, (2021)A IoT Terminal Position Recognition Method Based on RSSI and Magnetic Field in A Low Trust Environment., , , , , , , and . CBD, page 327-332. IEEE, (2021)Fake Reviewer Group Detection in Online Review Systems., , , and . ICDM (Workshops), page 935-942. IEEE, (2021)Efficient Edge Service Migration in Mobile Edge Computing., , , , , , and . ICPADS, page 691-696. IEEE, (2020)Adaptive DNN Partition in Edge Computing Environments., , , , , and . ICPADS, page 685-690. IEEE, (2020)Security Analysis of Cryptocurrency Wallets in Android-Based Applications., , , , , , and . IEEE Netw., 34 (6): 114-119 (2020)State Space Model for New-Generation Network Alternative to Transformers: A Survey., , , , , , , , , and 6 other author(s). CoRR, (2024)Reconfigurable physical unclonable cryptographic primitives based on current-induced nanomagnets switching., , , , , , and . Sci. China Inf. Sci., (2022)PEDR: Exploiting phase error drift range to detect full-model rogue access point attacks., , , and . Comput. Secur., (2022)Adaptive Task Scheduling in Cloud-Edge System for Edge Intelligence Application., , , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 1682-1689. IEEE, (2021)