Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Method for Linear Ill-Posed Problems: Iteration Method by Rectifying Eigenvalue., , , and . ADMA, volume 3584 of Lecture Notes in Computer Science, page 331-338. Springer, (2005)DreamReward: Text-to-3D Generation with Human Preference., , , , , , , and . CoRR, (2024)An approach to calculate optimal window-width serving for the information diffusion technique., , and . Int. J. General Systems, 33 (2-3): 223-231 (2004)GIS-based digital mining management information system: a case in Laozhaiwan gold mine., , , and . IGARSS, page 3. IEEE, (2005)Learning Sparse Representation With Variational Auto-Encoder for Anomaly Detection., , , and . IEEE Access, (2018)Efficient Truss Computation for Large Hypergraphs., , , , and . WISE, volume 13724 of Lecture Notes in Computer Science, page 290-305. Springer, (2022)Camouflaged Object Segmentation with Transformer., , , and . ICCSIP, volume 1515 of Communications in Computer and Information Science, page 225-237. Springer, (2021)A Fuzzy Comprehensive Clustering Method., and . ADMA, volume 4632 of Lecture Notes in Computer Science, page 488-499. Springer, (2007)Isotropic3D: Image-to-3D Generation Based on a Single CLIP Embedding., , , , , , and . CoRR, (2024)Equivariant Local Reference Frames for Unsupervised Non-rigid Point Cloud Shape Correspondence., , , , , , , , and . CoRR, (2024)