Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trojan Horse Attack Strategy on Quantum Private Communication., , , and . ISPEC, volume 3903 of Lecture Notes in Computer Science, page 177-186. Springer, (2006)An Interactive Approach for Filtering Out Junk Images From Keyword-Based Google Search Results., , , , and . IEEE Trans. Circuits Syst. Video Techn., 19 (12): 1851-1865 (2009)A novel facial expression database construction method based on web images., , and . ICIMCS, page 124-127. ACM, (2011)Aggregating diverse deep attention networks for large-scale plant species identification., , , , , and . Neurocomputing, (2020)Content-Irrelevant Tag Cleansing via Bi-Layer Clustering and Peer Cooperation., , , and . J. Signal Process. Syst., 81 (1): 29-44 (2015)Multiorientation scene text detection via coarse-to-fine supervision-based convolutional networks., , , and . J. Electronic Imaging, 27 (03): 033032 (2018)Efficient Large-Scale Image Data Set Exploration: Visual Concept Network and Image Summarization., , , and . MMM (2), volume 6524 of Lecture Notes in Computer Science, page 111-121. Springer, (2011)Cross-modal social image clustering and tag cleansing., , and . J. Vis. Commun. Image Represent., 24 (7): 895-910 (2013)Automatic tag-to-region assignment via multiple instance learning., , , , and . Multim. Tools Appl., 74 (3): 979-1002 (2015)Multilayer feature descriptors fusion CNN models for fine-grained visual recognition., , , , , and . Comput. Animat. Virtual Worlds, (2019)