Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An adaptive routing algorithm considering position and social similarities in an opportunistic network., , , , and . Wireless Networks, 22 (5): 1537-1551 (2016)RewriteNet: Realistic Scene Text Image Generation via Editing Text in Real-world Image., , , , , , and . CoRR, (2021)3D Human Motion Generation from the Text Via Gesture Action Classification and the Autoregressive Model., , , , , and . ICIP, page 1036-1040. IEEE, (2022)Community-based diffusion scheme using Markov chain and spectral clustering for mobile social networks., , , and . Wireless Networks, 25 (2): 875-887 (2019)A forwarding scheme based on swarm intelligence and percolation centrality in opportunistic networks., , , , and . Wireless Networks, 22 (8): 2511-2521 (2016)Unsupervised Real-World Super Resolution with Cycle Generative Adversarial Network and Domain Discriminator., , , , , , , and . CVPR Workshops, page 1862-1871. Computer Vision Foundation / IEEE, (2020)Encoded Image-Based Time Series Classification for Improving Colorimetric Detection of Hydrogen Sulfide (H2S)., , , , , , , , , and 1 other author(s). IEEE SENSORS, page 1-4. IEEE, (2022)KU-ISPL TRECVID 2020 VTT Model., , , and . TRECVID, National Institute of Standards and Technology (NIST), (2020)Hierarchical spatial object detection for ATM vandalism surveillance., , , and . AVSS, page 1-5. IEEE, (2018)Character Region Attention for Text Spotting., , , , , , and . ECCV (29), volume 12374 of Lecture Notes in Computer Science, page 504-521. Springer, (2020)