Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Reversible Watermark Scheme Combined with Hash Function and Lossless Compression., , , and . KES (2), volume 3682 of Lecture Notes in Computer Science, page 1168-1174. Springer, (2005)Thermally Stable All‐Polymer Solar Cells with High Tolerance on Blend Ratios, , , , , , , , , and . Advanced Energy Materials, (June 2018)Dual-branch counting method for dense crowd based on self-attention mechanism., , and . Expert Syst. Appl., (February 2024)IKN-CF: An Approach to Identify Key Nodes in Inter-Domain Routing Systems Based on Cascading Failures., , , and . Entropy, 23 (11): 1456 (2021)Intelligent Penetration Testing in Dynamic Defense Environment., , , and . CSW, page 10-15. ACM, (2022)DualCF: Efficient Model Extraction Attack from Counterfactual Explanations., , and . FAccT, page 1318-1329. ACM, (2022)Cheat-FlipIt: An Approach to Modeling and Perception of a Deceptive Opponent., , and . SETTA, volume 14464 of Lecture Notes in Computer Science, page 368-384. Springer, (2023)Design of action detection system in wrestling match video based on 3D convolutional neural network., , , , and . Int. J. Wirel. Mob. Comput., 22 (1): 29-37 (2022)Prufer Coding: A Vectorization Method for Undirected Labeled Graph., and . IEEE Access, (2020)Multi-density map fusion network for crowd counting., , , and . Neurocomputing, (2020)