Author of the publication

Multi-modal Face Anti-spoofing Using Channel Cross Fusion Network and Global Depth-Wise Convolution.

, , , , and . KSEM (2), volume 13369 of Lecture Notes in Computer Science, page 429-441. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance analysis of joint relay selection and transmission schemes in multiple-antenna two-way relay systems., , , and . EURASIP J. Wireless Comm. and Networking, (2015)SNA: A Siamese Network Accelerator to Exploit the Model-Level Parallelism of Hybrid Network Structure., , , and . DATE, page 192-197. IEEE, (2020)Channel congestion performance analysis for DSRC vehicle ad hoc network., , and . ChinaCom, page 600-606. IEEE Computer Society, (2015)Detecting disease-associated genes with confounding variable adjustment and the impact on genomic meta-analysis: With application to major depressive disorder., , , , and . BMC Bioinform., (2012)A Efficient Adaptive Data Rate Algorithm in LoRaWAN Networks: K-ADR., , and . APNOMS, page 183-188. IEEE, (2023)An R package suite for microarray meta-analysis in quality control, differentially expressed gene analysis and pathway enrichment detection., , , , , , , , , and 5 other author(s). Bioinform., 28 (19): 2534-2536 (2012)Multi-modal Face Anti-spoofing Using Channel Cross Fusion Network and Global Depth-Wise Convolution., , , , and . KSEM (2), volume 13369 of Lecture Notes in Computer Science, page 429-441. Springer, (2022)NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks., , , , , and . ISCA, page 776-789. IEEE, (2021)Comparative Secretome Analysis of Magnaporthe oryzae Identified Proteins Involved in Virulence and Cell Wall Integrity., , , , , , , , , and 2 other author(s). Genom. Proteom. Bioinform., 20 (4): 728-746 (August 2022)Mimic Octopus Attack: Dynamic Camouflage Adversarial Examples Using Mimetic Feature for 3D Humans., , , and . Inscrypt, volume 13837 of Lecture Notes in Computer Science, page 429-444. Springer, (2022)