Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transferable Black-Box Attack Against Face Recognition With Spatial Mutable Adversarial Patch., , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Complex-Valued Neural Networks for Privacy Protection., , , , and . CoRR, (2019)Rotation-Equivariant Neural Networks for Privacy Protection., , , , , , , and . CoRR, (2020)Forecasting of Wind Capacity Ramp Events Using Typical Event Clustering Identification., , , , , and . IEEE Access, (2020)AutoWS-Bench-101: Benchmarking Automated Weak Supervision with 100 Labels., , , , , , , , , and . NeurIPS, (2022)Design and Development of Intelligent Learning Companion for Primary School Students Based on the Tour of Well-Known Scenic Spots in Beijing., , , and . HCI (26), volume 10296 of Lecture Notes in Computer Science, page 461-472. Springer, (2017)Economic Dispatch of Combined Heat and Power Energy Systems Using Electric Boiler to Accommodate Wind Power., , , , , , and . IEEE Access, (2020)GLogS: Interactive Graph Pattern Matching Query At Large Scale., , , , , , , , , and 4 other author(s). USENIX Annual Technical Conference, page 53-69. USENIX Association, (2023)Generalized Benders Decomposition Based Dynamic Optimal Power Flow Considering Discrete and Continuous Decision Variables., , , and . IEEE Access, (2020)Visual graph mining for graph matching., , , , and . Comput. Vis. Image Underst., (2019)