Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Binocular image dominant mechanism., , and . IGARSS, page 4367-4370. IEEE, (2012)Visual-Textual Association with Hardest and Semi-Hard Negative Pairs Mining for Person Search., , and . CoRR, (2019)Technology Entrepreneurship of Large State-Owned Firms in Emerging Economies., , and . J. Glob. Inf. Manag., 28 (4): 120-134 (2020)A resolution enhancement algorithm for an asymmetric resolution stereo video., , , and . EURASIP J. Image Video Process., (2015)Hardest and semi-hard negative pairs mining for text-based person search with visual-textual attention., , and . Multim. Syst., 29 (5): 3081-3093 (October 2023)Emoji Sequence Use in Enacting Personal Identity.. WWW (Companion Volume), page 426-438. ACM, (2019)Strategic Use of Social Media Affordances for Marketing: A Case Study of Chinese DMOs., , and . ENTER, page 159-173. Springer, (2014)Power Attack and Protected Implementation on Lightweight Block Cipher SKINNY., , , , , and . AsiaJCIS, page 69-74. IEEE Computer Society, (2018)An SEI-SI avian-human influenza model with diffusion and nonlocal delay., , and . Appl. Math. Comput., (2014)Ecological Risk Assessment and Impact Factor Analysis of Alpine Wetland Ecosystem Based on LUCC and Boosted Regression Tree on the Zoige Plateau, China., , , , , , , , and . Remote. Sens., 12 (3): 368 (2020)