Author of the publication

Unsupervised Embedding Adaptation via Early-Stage Feature Reconstruction for Few-Shot Classification.

, and . ICML, volume 139 of Proceedings of Machine Learning Research, page 6098-6108. PMLR, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vulnerabilities of Android OS-Based Telematics System., , , , and . Wireless Personal Communications, 92 (4): 1511-1530 (2017)Robust E-mail protocols with perfect forward secrecy., , and . IEEE Communications Letters, 10 (6): 510-512 (2006)A 5Gb/s/pin 16Gb LPDDR4/4X Reconfigurable SDRAM with Voltage-High Keeper and a Prediction-based Fast-tracking ZQ Calibration., , , , , , , , , and 14 other author(s). VLSI Circuits, page 114-. IEEE, (2019)Improved hidden vector encryption with short ciphertexts and tokens., and . Des. Codes Cryptogr., 58 (3): 297-319 (2011)Forward Secure Searchable Encryption Using Key-Based Blocks Chain Technique., , , , , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 85-97. Springer, (2018)SmartRescue: Multi Agent System Based on Location and Context Aware Information., and . MMAS, volume 3446 of Lecture Notes in Computer Science, page 295-308. Springer, (2004)Efficient Multicast Key Management for Stateless Receivers., , , and . ICISC, volume 2587 of Lecture Notes in Computer Science, page 497-509. Springer, (2002)Secure Index Search for Groups., , and . TrustBus, volume 3592 of Lecture Notes in Computer Science, page 128-140. Springer, (2005)Direct Chosen-Ciphertext Secure Hierarchical ID-Based Encryption Schemes., and . EuroPKI, volume 4582 of Lecture Notes in Computer Science, page 94-109. Springer, (2007)N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords., and . ACNS, volume 3531 of Lecture Notes in Computer Science, page 75-90. (2005)