Author of the publication

Video Monitoring System Application to Urban Traffic Intersection.

, , , , and . SimuTools, volume 295 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 339-345. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User behavior and user experience analysis for social network services., , and . Wirel. Networks, 27 (5): 3613-3619 (2021)Robust Lottery Tickets for Pre-trained Language Models., , , , , , , , and . ACL (1), page 2211-2224. Association for Computational Linguistics, (2022)Video Monitoring System Application to Urban Traffic Intersection., , , , and . SimuTools, volume 295 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 339-345. Springer, (2019)LipoFNT: Lipoylation Sites Identification with Flexible Neural Tree., , , and . Complex., (2019)Medical image security authentication method based on wavelet reconstruction and fractal dimension., , , , , , and . Int. J. Distributed Sens. Networks, 17 (4): 155014772110141 (2021)Flooding-X: Improving BERT's Resistance to Adversarial Attacks via Loss-Restricted Fine-Tuning., , , , , , , , , and . ACL (1), page 5634-5644. Association for Computational Linguistics, (2022)CASN: Class-Aware Score Network for Textual Adversarial Detection., , , , and . ACL (1), page 671-687. Association for Computational Linguistics, (2023)Design Enablement of 3-Dies Stacked 3D-ICs Using Fine-Pitch Hybrid-Bonding and TSVs., , , , , , , , , and 1 other author(s). 3DIC, page 1-4. IEEE, (2023)An effective SNR gene prediction algorithm based on merge of nucleotide segments (MNS)., , , , and . ASCC, page 1-6. IEEE, (2013)Mitigating Reward Hacking via Information-Theoretic Reward Modeling., , , , , and . CoRR, (2024)