Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Availability Analysis Method of Multilevel Security Models with Credibility Characteristics, , , and . Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on, 1, page 175-178. (April 2009)Global Workspace and Direct Cortex Access: An Astral Framework for Consciousness., , and . IC-AI, page 521-524. CSREA Press, (2004)K2 and K 2 * : efficient alignment-free sequence similarity measurement based on Kendall statistics., , , and . Bioinform., 34 (10): 1682-1689 (2018)Optimal Merchandise Selection Strategy in E-Store Promotional Webpage: A TOPSIS based Approach., and . J. Electron. Commer. Organ., 14 (2): 1-15 (2016)Tiny Descriptors for Image Retrieval with Unsupervised Triplet Hashing., , , , and . CoRR, (2015)Beyond Ranking Loss: Deep Holographic Networks for Multi-Label Video Search., , , , and . ICIP, page 879-883. IEEE, (2019)Region average pooling for context-aware object detection., , , , and . ICIP, page 1347-1351. IEEE, (2017)Group Invariant Deep Representations for Image Instance Retrieval., , , , , and . CoRR, (2016)Group Invariant Deep Representations for Image Instance Retrieval., , , , , and . AAAI Spring Symposia, AAAI Press, (2017)Toward a Gaussian-Mixture Model-Based Detection Scheme Against Data Integrity Attacks in the Smart Grid., , , , and . IEEE Internet Things J., 4 (1): 147-161 (2017)