Author of the publication

A Light-Weighted Network for Facial Landmark Detection via Combined Heatmap and Coordinate Regression.

, , , , , , and . ICME, page 314-319. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Left and right hand distinction for multi-touch tabletop interactions., , , , , and . IUI, page 47-56. ACM, (2014)The Impact Analysis of Multiple Miners and Propagation Delay on Selfish Mining., , , , , , and . COMPSAC, page 694-703. IEEE, (2021)GMM-based Undersampling and Its Application for Credit Card Fraud Detection., , , , and . IJCNN, page 1-8. IEEE, (2019)3D model-based continuous emotion recognition., , , , and . CVPR, page 1836-1845. IEEE Computer Society, (2015)Multi-head multi-order graph attention networks., , , , and . Appl. Intell., 54 (17-18): 8092-8107 (September 2024)A New Virtual Dynamic Dentomaxillofacial System for Analyzing Mandibular Movement, Occlusal Contact, and TMJ Condition., , , , , and . HCI (12), volume 4561 of Lecture Notes in Computer Science, page 747-756. Springer, (2007)PSCVFinder: A Prompt-Tuning Based Framework for Smart Contract Vulnerability Detection., , , , , and . ISSRE, page 556-567. IEEE, (2023)A Novel Fast Method for L ∞ Problems in Multiview Geometry., , , and . ECCV (5), volume 7576 of Lecture Notes in Computer Science, page 116-129. Springer, (2012)Detecting Flash Loan Based Attacks in Ethereum., , , , , , and . ICDCS, page 154-165. IEEE, (2023)Multimodal Visual Analysis of Vector-Borne Infectious Diseases., , , , , and . IGTA, volume 875 of Communications in Computer and Information Science, page 135-145. Springer, (2018)