Author of the publication

Pseudo-label Diversity Exploitation for Few-Shot Object Detection.

, , , , and . MMM (2), volume 13834 of Lecture Notes in Computer Science, page 289-300. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximate Analysis of Re-Entrant Lines with Bernoulli Reliability Models., and . CASE, page 398-403. IEEE, (2007)Comparative performance analysis of SFH/FDM DRT and OBP satellite payloads under jamming., , and . ICC, page 3190-3194. IEEE, (2012)How to Reduce Software Development Cost with Personnel Assignment Optimization: Exemplary Improvement on the Hungarian Algorithm., , , and . EASE, page 270-279. ACM, (2017)基于智能电表运行故障数据的纵向分析模型 (Vertical Analysis Based on Fault Data of Running Smart Meter)., , , , , , and . 计算机科学, 46 (6A): 436-438 (2019)Efficient spectral reconstruction using a trichromatic camera via sample optimization., , , and . Vis. Comput., 34 (12): 1773-1783 (2018)A New Regularized Adaptive Windowed Lomb Periodogram for Time-Frequency Analysis of Nonstationary Signals With Impulsive Components., , and . IEEE Trans. Instrum. Meas., 61 (8): 2283-2304 (2012)Robust Deep Co-Saliency Detection With Group Semantic and Pyramid Attention., , , , and . IEEE Trans. Neural Networks Learn. Syst., 31 (7): 2398-2408 (2020)Wildfire Smoke Detection with Cross Contrast Patch Embedding., , , , and . CoRR, (2023)Option pricing and coordination in the fresh produce supply chain with portfolio contracts., and . Ann. Oper. Res., 248 (1-2): 471-491 (2017)Understanding the Decision-Making of Students in Requirements Engineering Course Projects., , , , , and . SEED@APSEC, volume 2506 of CEUR Workshop Proceedings, page 1-8. CEUR-WS.org, (2019)