Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of vulnerable path: Using heuristic path-finding algorithm in physical protection system of nuclear power plant., , , , , , and . Int. J. Crit. Infrastructure Prot., (2018)Anomaly detection in surveillance video based on bidirectional prediction., , , , and . Image Vis. Comput., (2020)Pattern-based service composition for user satisfaction and service revenue., , , , and . Int. J. Serv. Technol. Manag., 25 (5/6): 585-600 (2019)Kalman Filtered Bio Heat Transfer Model Based Self-adaptive Hybrid Magnetic Resonance Thermometry., , , , , , , and . IEEE Trans. Med. Imaging, 36 (1): 194-202 (2017)Diffusion Reconstruction of Ultrasound Images with Informative Uncertainty., , , and . CoRR, (2023)The Application of Driver Models in the Safety Assessment of Autonomous Vehicles: A Survey., , , , and . CoRR, (2023)A Survey of Deep Learning Models for Structural Code Understanding., , , , and . CoRR, (2022)MotionCrafter: One-Shot Motion Customization of Diffusion Models., , , , , , and . CoRR, (2023)Learning Image Demoireing from Unpaired Real Data., , , , and . CoRR, (2024)Super Vision Transformer., , , , , , and . CoRR, (2022)