Author of the publication

The Devil is in the Middle: Exploiting Mid-level Representations for Cross-Domain Instance Matching.

, , , , and . CoRR, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Degradation of the In-plane Shear Modulus of Structural BFRP Laminates Due to High Temperature., , , , and . Sensors, 18 (10): 3361 (2018)Blind Multiuser Detection for Long Code Multipath DS-CDMA Systems with Bayesian MC Techniques., , and . Wireless Personal Communications, 39 (3): 265-278 (2006)Unequal Error Protection Scheme for Multiple-Input and Multiple-Output Wireless Systems., , and . VTC Fall, page 1-5. IEEE, (2006)Bayesian Trees for Automated Cytometry Data Analysis., , , , and . MLHC, volume 85 of Proceedings of Machine Learning Research, page 465-483. PMLR, (2018)Human mobility discovering and movement intention detection with GPS trajectories., , , and . Decis. Support Syst., (2014)A combined homotopy interior point method for the linear complementarity problem., , and . Appl. Math. Comput., 179 (2): 696-701 (2006)SoC-constrained team formation with self-organizing mechanism in social networks., , , and . Knowl. Based Syst., (2017)Performance modeling of licklider transmission protocol (LTP) in deep-space communication., , , and . IEEE Trans. Aerosp. Electron. Syst., 51 (3): 1609-1620 (2015)Flight visual simulation system based on sensor technology and QAR data.. J. Intell. Fuzzy Syst., 40 (4): 5893-5903 (2021)Similarity-based non-singleton general type-2 fuzzy logic controller with applications to mobile two-wheeled robots., , , , and . J. Intell. Fuzzy Syst., 37 (5): 6841-6854 (2019)