Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cx22: A new publicly available dataset for deep learning-based segmentation of cervical cytology images., , , , , and . Comput. Biol. Medicine, (2022)Video forensics research based on authenticity and integrity., , , , and . ICIA, page 1223-1226. IEEE, (2016)The Design of a Cloud Forensics Middleware System Base on Memory Analysis., , , , and . SoCPaR, volume 942 of Advances in Intelligent Systems and Computing, page 258-267. Springer, (2018)LOLWTC: A Deep Learning Approach for Detecting Living Off the Land Attacks., , , and . CCIS, page 176-181. IEEE, (2023)A Video Watermarking Scheme Based on Multi-Algorithm Selection., , , and . IIH-MSP, page 252-255. IEEE, (2012)A real-time small target detection network., , , and . Signal Image Video Process., 15 (6): 1265-1273 (2021)Review of intelligent video surveillance technology research., , , , and . EMEIT, page 230-233. IEEE, (2011)Linking social network accounts by modeling user spatiotemporal habits., , , , and . ISI, page 19-24. IEEE, (2017)Recognizing roles of online illegal gambling participants: An ensemble learning approach., , , , and . Comput. Secur., (2019)Sequential Multi-task Learning with Task Dependency for Appeal Judgment Prediction., , , , , and . CoRR, (2022)