Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exposing digital audio forgeries in time domain by using singularity analysis with wavelets., , , and . IH&MMSec, page 149-158. ACM, (2013)Luminance Enhancement Method for Two-photon Microscopy Images of Low-light Ovarian Tissue Cells., , , , , , , and . ICSAI, page 988-992. IEEE, (2018)LSD Based Vision Detection System for Industrial Robot under Complex Illumination Conditions., , and . ROBIO, page 30-35. IEEE, (2019)Active contour model driven by local histogram fitting energy., , and . Pattern Recognit. Lett., 34 (6): 655-662 (2013)Effective Mechanism for Social Recommendation of News, , , , , and . CoRR, (2011)Degree heterogeneity in spatial networks with total cost constraint, , and . CoRR, (2011)Enhancing network robustness for malicious attacks, and . CoRR, (2012)Construction of the Performance Index System of Navigation Confrontation and Research on Its Related Evaluation Methods., , , , and . IEEE Trans. Instrum. Meas., (2022)Influence of cognitive ability on task performance of dynamic decision making in military vehicles under different task complexity., , and . Cogn. Technol. Work., 21 (3): 445-455 (2019)Salient-Boundary-Guided Pseudo-Pixel Supervision for Weakly-Supervised Semantic Segmentation., , , , and . IEEE Signal Process. Lett., (2024)