Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast cutting simulations with underlying lattices., , , and . BMEI, page 283-289. IEEE, (2013)Detection, Localization and Classification of Multiple Mechanized Ocean Vessels over Continental-Shelf Scale Regions with Passive Ocean Acoustic Waveguide Remote Sensing., , , , , , , and . Remote Sensing, 10 (11): 1699 (2018)Decomposing Synthesized Strategies for Reactive Multi-agent Reinforcement Learning., , , and . TASE, volume 13931 of Lecture Notes in Computer Science, page 59-76. Springer, (2023)Semantics of Real-Time Trigger-Response Properties in Event-B., , and . TASE, page 150-155. IEEE Computer Society, (2018)Automatic Depression Detection via Learning and Fusing Features From Visual Cues., , , and . IEEE Trans. Comput. Soc. Syst., 10 (5): 2806-2813 (October 2023)EFECL: Feature encoding enhancement with contrastive learning for indoor 3D object detection., , , , and . Comput. Vis. Media, 9 (4): 875-892 (December 2023)Learning accurate template matching with differentiable coarse-to-fine correspondence refinement., , , , , and . Comput. Vis. Media, 10 (2): 309-330 (April 2024)Multi-Resolution Monocular Depth Map Fusion by Self-Supervised Gradient-Based Composition., , , , and . AAAI, page 488-496. AAAI Press, (2023)A semi-supervised coarse-to-fine approach with bayesian optimization for lithology identification., , , and . Earth Sci. Informatics, 16 (3): 2285-2305 (September 2023)Effective defense strategies in network security using improved double dueling deep Q-network., , , and . Comput. Secur., (January 2024)