Author of the publication

Strategic Preys Make Acute Predators: Enhancing Camouflaged Object Detectors by Generating Camouflaged Objects.

, , , , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Architecture Research and Design Implementation of Multi-data and Multi-path Communication Control System., , and . CyberC, page 206-209. IEEE Computer Society, (2013)Customer churn prediction using improved balanced random forests., , , and . Expert Syst. Appl., 36 (3): 5445-5449 (2009)Application of data mining techniques in customer relationship management: A literature review and classification., , and . Expert Syst. Appl., 36 (2): 2592-2602 (2009)DRT: Deformable Region-Based Transformer for Nonrigid Medical Image Registration With a Constraint of Orientation., , and . IEEE Trans. Instrum. Meas., (2023)ETDNet: Efficient Transformer-Based Detection Network for Surface Defect Detection., , , , , and . IEEE Trans. Instrum. Meas., (2023)A Review on Fuzzy Differential Equations., and . IEEE Access, (2021)Colorimetric Observer Categories for Young and Aged Using Paired-Comparison Experiments., , , , and . IEEE Access, (2020)The Development and Applications of the Semi-Airborne Electromagnetic System in China., , , , and . IEEE Access, (2019)A steel surface defect inspection approach towards smart industrial monitoring., , , , and . J. Intell. Manuf., 32 (7): 1833-1843 (2021)Coarse-to-Fine Knowledge-Enhanced Multi-Interest Learning Framework for Multi-Behavior Recommendation., , , , , , , , and . ACM Trans. Inf. Syst., 42 (1): 30:1-30:27 (January 2024)