Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Quality of Pose-varied Face Restoration with Local Weak Feature Sensing and GAN Prior., , , , , and . CoRR, (2022)A Recipe for Improved Certifiable Robustness: Capacity and Data., , , and . CoRR, (2023)FunCodec: A Fundamental, Reproducible and Integrable Open-source Toolkit for Neural Speech Codec., , , and . CoRR, (2023)Detect-Order-Construct: A Tree Construction based Approach for Hierarchical Document Structure Analysis., , , , and . CoRR, (2024)Baselining Network-Wide Traffic by Time-Frequency Constrained Stable Principal Component Pursuit, and . CoRR, (2013)Text to Image Generation with Semantic-Spatial Aware GAN., , , and . CoRR, (2021)Identifying the "Ghost City" of domain topics in a keyword semantic space combining citations., , , , , , , , and . Scientometrics, 114 (3): 1141-1157 (2018)The axiomatic characterizations on L-fuzzy covering-based approximation operators., , , and . Int. J. Gen. Syst., 46 (4): 332-353 (2017)BAKSHEESH: Similar Yet Different From GIFT., , , , , , , , , and 7 other author(s). IACR Cryptol. ePrint Arch., (2023)Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128., , , and . IACR Cryptol. ePrint Arch., (2021)