Author of the publication

GAF-GAN: Gated Attention Feature Fusion Image Inpainting Network Based on Generative Adversarial Network.

, , , and . ICPADS, page 2682-2689. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online System for Grid Resource Monitoring and Machine Learning-Based Prediction., , and . IEEE Trans. Parallel Distributed Syst., 23 (1): 134-145 (2012)A Survey on Key Management of Identity-based Schemes in Mobile Ad Hoc Networks., , , , , and . J. Commun., 8 (11): 768-779 (2013)Enhancement of an Authenticated 3-round Identity-Based Group Key Agreement Protocol., , , , and . J. Networks, 6 (11): 1578-1585 (2011)Cryptanalysis of Three Event Signature Protocols for Peer-to-peer Massively Multiplayer Online Games., , , , and . J. Networks, 7 (3): 510-516 (2012)Graph Learning Approaches to Recommender Systems: A Review., , , , , , , , , and . CoRR, (2020)Secure event signature protocol for peer-to-peer massive multiplayer online games using bilinear pairing., , , and . Secur. Commun. Networks, 6 (7): 881-888 (2013)Feasibility of Output-Only Modal Identification Using Wireless Sensor Network: A Quantitative Field Experimental Study., , , and . Int. J. Distributed Sens. Networks, (2012)Implementing Data Aware Scheduling In Gfarm(R) Using LSF(TM) Scheduler plugin Mechanism., , , , , and . GCA, page 3-10. CSREA Press, (2005)Reputation system for user-generated podcasting under community based mobility model., and . WICON, page 75. ICST, (2008)Multi-stage Attack Detection Algorithm Based on Hidden Markov Model., , , and . WISM, volume 7529 of Lecture Notes in Computer Science, page 275-282. Springer, (2012)