Author of the publication

PrefAce: Face-Centric Pretraining with Self-Structure Aware Distillation.

, , , , , , and . AAAI, page 12538-12546. AAAI Press, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fast Sparse Representation Method for SAR Target Configuration Recognition., , , , , and . IGARSS, page 6999-7002. IEEE, (2018)Evaluation of a Fault Tolerant Distributed Broadcast Algorithm in Hypercube Multicomputers., , and . ACM Conference on Computer Science, page 459-466. ACM, (1992)Hybrid Optimized Low-Dissipation and Adaptive MUSCL Reconstruction Technique for Hyperbolic Conservation Laws., , , and . J. Sci. Comput., 77 (1): 552-578 (2018)Dominating-Set-Based Searching in Peer-to-Peer Networks., and . GCC (1), volume 3032 of Lecture Notes in Computer Science, page 332-339. Springer, (2003)A Greedy Algorithm for Capacity-Constrained Surrogate Placement in CDNs., , , and . NPC, volume 3779 of Lecture Notes in Computer Science, page 180-188. Springer, (2005)Searching Techniques in Peer-to-Peer Networks., and . Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks, CRC Press / Taylor & Francis, (2005)A Client-Biased Cooperative Search Scheme in Blockchain-Based Data Markets., , and . ICCCN, page 1-9. IEEE, (2019)Effective Query Grouping Strategy in Clouds., , , and . J. Comput. Sci. Technol., 32 (6): 1231-1249 (2017)Dependable Structural Helath Monitoring Using Wireless Sensor Networks., , , and . CoRR, (2015)FlowTrust: trust inference with network flows., and . Frontiers Comput. Sci. China, 5 (2): 181-194 (2011)