Author of the publication

Hybridizing Euclidean and Hyperbolic Similarities for Attentively Refining Representations in Semantic Segmentation of Remote Sensing Images.

, , , , , , , and . IEEE Geosci. Remote. Sens. Lett., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybridizing Euclidean and Hyperbolic Similarities for Attentively Refining Representations in Semantic Segmentation of Remote Sensing Images., , , , , , , and . IEEE Geosci. Remote. Sens. Lett., (2022)On the Distributed DoS Attacks Targeting at the Bottlenecked Links: More Threatening DoS Attacks than Server Targeting DoS Attacks., and . CNIOT, page 40:1-40:7. ACM, (2021)Fusion: Efficient and Secure Inference Resilient to Malicious Servers., , , , , , , and . NDSS, The Internet Society, (2023)Multiuser Multivariate Multiorder Markov-Based Multimodal User Mobility Pattern Prediction., , , , and . IEEE Internet Things J., 7 (5): 4519-4531 (2020)Performance Analysis of Dynamic Re-Clustering and Resource Allocation in Ultra Dense Network., , , and . IEEE Access, (2018)Research on Somatotype Recognition Method Based on Euclidean Distance., , , and . AHFE (13), volume 1213 of Advances in Intelligent Systems and Computing, page 242-249. Springer, (2020)An Intelligent and Efficient Rehabilitation Status Evaluation Method: A Case Study on Stroke Patients., , , , and . Poly/DMAH@VLDB, volume 12633 of Lecture Notes in Computer Science, page 100-119. Springer, (2020)Do mutual funds time the market?: Evidence from portfolio holdings, , and . Journal of Financial Economics, 86 (3): 724--758 (December 2007)Balanced Training for the End-to-End Autonomous Driving Model Based on Kernel Density Estimation., , , and . IV, page 2361-2366. IEEE, (2024)The Stronger the Diffusion Model, the Easier the Backdoor: Data Poisoning to Induce Copyright BreachesWithout Adjusting Finetuning Pipeline., , , , and . ICML, OpenReview.net, (2024)