Author of the publication

Improved YOLOv5 Network with Attention and Context for Small Object Detection.

, , , , and . ICIC (3), volume 13395 of Lecture Notes in Computer Science, page 341-352. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Oscillation and Strong Oscillation for Impulsive Neutral Parabolic Differential Systems with Delays., and . ICIC (2), volume 3645 of Lecture Notes in Computer Science, page 472-481. Springer, (2005)Global exponential stability of impulsive delayed reaction-diffusion neural networks via Hardy-Poincarè inequality., and . Neurocomputing, (2012)Theory and application of stability for stochastic reaction diffusion systems., , , , and . Sci. China Ser. F Inf. Sci., 51 (2): 158-170 (2008)A novel adaptive cooperative attack design against cyber-physical systems via mixed H∞/H- index., and . J. Frankl. Inst., 358 (1): 17-34 (2021)Distributed Secure Control Against Denial-of-Service Attacks in Cyber-Physical Systems Based on K-Connected Communication Topology., and . IEEE Trans. Cybern., 50 (7): 3094-3103 (2020)False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach., and . Autom., (2020)Distributed event-triggered control for multi-agent systems under intermittently random denial-of-service attacks., and . Inf. Sci., (2021)Completely Event-Triggered Consensus for Multiagent Systems With Directed Switching Topologies., , and . IEEE Trans. Cybern., 52 (8): 7865-7874 (2022)Decentralized False-Data Injection Attacks Against State Omniscience: Existence and Security Analysis., , and . IEEE Trans. Autom. Control., 68 (8): 4634-4649 (August 2023)Distributed Event-Triggered Control for Multiagent Systems Under Denial-of-Service Attacked Topology: Secure Mode Strategy., , and . IEEE Trans. Syst. Man Cybern. Syst., 52 (10): 6534-6544 (2022)