Author of the publication

Drowning behavior detection in swimming pool based on deep learning.

, , , and . Signal Image Video Process., 16 (6): 1683-1690 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Host-Based Approach for Unknown Fast-Spreading Worm Detection and Containment., , , , and . ACM Trans. Auton. Adapt. Syst., 8 (4): 21:1-21:18 (2014)Leveraging Frequency Domain Learning in 3D Vessel Segmentation., , , , , , and . CoRR, (2024)LLM-Enhanced User-Item Interactions: Leveraging Edge Information for Optimized Recommendations., , , , and . CoRR, (2024)Knockoff-Guided Feature Selection via A Single Pre-trained Reinforced Agent., , , , , and . CoRR, (2024)Bidirectional colorless WDM-PON RoF system with large spurious free dynamic range., , , , , , , and . JOCN, 14 (5): 389-397 (2022)Roving bugnet: Distributed surveillance threat and mitigation., and . Comput. Secur., 29 (5): 592-602 (2010)Identifying Linear Traces of the Han Dynasty Great Wall in Dunhuang Using Gaofen-1 Satellite Remote Sensing Imagery and the Hough Transform., , , , , , , and . Remote. Sens., 11 (22): 2711 (2019)Auto-Extraction of Linear Archaeological Traces of Tuntian Irrigation Canals in Miran Site (China) from Gaofen-1 Satellite Imagery., , , , , , , , and . Remote. Sens., 10 (5): 718 (2018)On the billing vulnerabilities of SIP-based VoIP systems., , , and . Comput. Networks, 54 (11): 1837-1847 (2010)Ecological Efficiency Measurement and Technical Heterogeneity Analysis in China: A Two-Stage Three-Level Meta-Frontier Network Model Based on Segmented Projection., , and . Syst., 12 (1): 22 (2024)