Author of the publication

Traffic Danger Recognition With Surveillance Cameras Without Training Data.

, , , and . AVSS, page 1-6. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding Application-Battery Interactions on Smartphones: A Large-Scale Empirical Study., , and . IEEE Access, (2017)On Generalizing Interrupt Handling into a Flexible Binding Model for Kernel Components., , and . ICESS, volume 3605 of Lecture Notes in Computer Science, page 423-429. Springer, (2004)DistFL: Distribution-aware Federated Learning for Mobile Scenarios., , , , , , , and . CoRR, (2021)The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors., , , , , , , , and . CoRR, (2024)Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools., , , , , , , , , and 1 other author(s). CCS, page 2396-2410. ACM, (2023)A Lightweight Dynamic Performance Monitoring Framework for Embedded Systems., , and . ICESS, page 256-262. IEEE Computer Society, (2009)Looxy: Web Access Optimization for Mobile Applications with a Local Proxy., , and . VTC Spring, page 1-5. IEEE, (2017)Automated Aspect Recommendation through Clustering-Based Fan-in Analysis., , and . ASE, page 278-287. IEEE Computer Society, (2008)An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective., , , , , , and . WWW, page 163-172. ACM, (2017)LibRadar: fast and accurate detection of third-party libraries in Android apps., , , and . ICSE (Companion Volume), page 653-656. ACM, (2016)