From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Blockchain Security: A Survey of Techniques and Research Directions., , , , и . IEEE Trans. Serv. Comput., 15 (4): 2490-2510 (2022)Control Theory-Inspired Model Design for Single Image De-Raining., и . IEEE Trans. Circuits Syst. II Express Briefs, 69 (2): 649-653 (2022)Effective Pan-Sharpening by Multiscale Invertible Neural Network and Heterogeneous Task Distilling., , , , и . IEEE Trans. Geosci. Remote. Sens., (2022)Learning Deep Multiscale Local Dissimilarity Prior for Pansharpening., , , , , , и . IEEE Trans. Geosci. Remote. Sens., (2023)Hidden Voice Commands: Attacks and Defenses on the VCS of Autonomous Driving Cars., , , , , и . IEEE Wirel. Commun., 26 (5): 128-133 (2019)LncADeep: an ab initio lncRNA identification and functional annotation tool based on deep learning., , , , , , и . Bioinform., 34 (22): 3825-3834 (2018)Memory-augmented Deep Unfolding Network for Guided Image Super-resolution., , , , , и . CoRR, (2022)Mitigating Link-flooding Attacks With Active Link Obfuscation., , , , и . CoRR, (2017)ReinforceNet: A reinforcement learning embedded object detection framework with region selection network., , , , , , и . Neurocomputing, (2021)Random Weights Networks Work as Loss Prior Constraint for Image Restoration., , , , , , , и . CoRR, (2023)