Author of the publication

Convolutional Neural Network-Driven Improvements in Global Cloud Detection for Landsat 8 and Transfer Learning on Sentinel-2 Imagery.

, , , , and . Remote. Sens., 15 (6): 1706 (March 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Berth-Crane Allocation Model and Algorithm of Container Berths in the Uncertain Environment., , , and . BIC-TA, volume 212 of Advances in Intelligent Systems and Computing, page 785-792. Springer, (2013)Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys., , , and . Comput. J., 62 (8): 1087-1091 (2019)Fully Deniable Mutual Authentication Protocol Based on RSA Signature., and . IACR Cryptology ePrint Archive, (2013)Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications., and . IACR Cryptology ePrint Archive, (2013)Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols., and . IACR Cryptology ePrint Archive, (2013)Efficient CCA-secure Threshold Public-Key Encryption Scheme., and . IACR Cryptology ePrint Archive, (2013)Separation of Speech from Speech Interference Based on EGG., , and . CORES, volume 977 of Advances in Intelligent Systems and Computing, page 37-46. Springer, (2019)A novel fast two step sub-pixel motion estimation algorithm in HEVC., , , , , and . ICASSP, page 1197-1200. IEEE, (2012)Adaptive search range algorithm based on Cauchy distribution., , , , and . VCIP, page 1-5. IEEE, (2012)Analysis of CMMB signal for passive radar detection., , , , , and . WCSP, page 1-6. IEEE, (2014)