Author of the publication

Deterministic Consensus Maximization with Biconvex Programming

, , , and . Computer Vision -- ECCV 2018, page 699--714. Cham, Springer International Publishing, (2018)
DOI: 10.1007/978-3-030-01258-8_42

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-preserved distinct content collection in human-assisted ubiquitous computing systems., , , , and . Inf. Sci., (2019)Latent-Data Privacy Preserving With Customized Data Utility for Social Network Data., , and . IEEE Trans. Veh. Technol., 67 (1): 665-673 (2018)Functional dependency restricted insertion propagation., , , and . Theor. Comput. Sci., (2020)Differentially Private Recommendation System Based on Community Detection in Social Network Applications., , , , and . Secur. Commun. Networks, (2018)Technique Report: Scheduling Flows with Multiple Service Frequency Constraints., , , and . CoRR, (2016)Microarray Missing Value Imputation by Iterated Local Least Squares., , and . APBC, page 159-168. Imperial College Press, London, (2006)A Model-Free Greedy Gene Selection for Microarray Sample Class Prediction., , , , , and . CIBCB, page 1-8. IEEE, (2006)ComPhy: prokaryotic composite distance phylogenies inferred from whole-genome gene sets., , , , and . BMC Bioinform., (2009)Multi-Source Adversarial Sample Attack on Autonomous Vehicles., , , and . IEEE Trans. Veh. Technol., 70 (3): 2822-2835 (2021)Cost-Efficient Strategies for Restraining Rumor Spreading in Mobile Social Networks., , , , , and . IEEE Trans. Veh. Technol., 66 (3): 2789-2800 (2017)