Author of the publication

Anomaly Detection Model for Key Places Based on Improved YOLOv5.

, , , and . ICAIS (2), volume 13339 of Lecture Notes in Computer Science, page 51-61. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

基于拓扑扩展的在线社交网络恶意信息源定位算法 (Malicious Information Source Locating Algorithm Based on Topological Extension in Online Social Network)., , , and . 计算机科学, 46 (5): 129-134 (2019)A Novel Transfer Learning-Based Algorithm for Detecting Violence Images., , , and . KSII Trans. Internet Inf. Syst., 16 (6): 1818-1832 (2022)Anomaly Detection Model for Key Places Based on Improved YOLOv5., , , and . ICAIS (2), volume 13339 of Lecture Notes in Computer Science, page 51-61. Springer, (2022)A Distributed User Association Algorithm in Heterogeneous Cellular Networks., , , , , and . HCC, volume 9567 of Lecture Notes in Computer Science, page 432-442. Springer, (2016)Research on a Framework for Chinese Argot Recognition and Interpretation by Integrating Improved MECT Models., , , and . Entropy, 26 (4): 321 (April 2024)Particle Propagation Model for Dynamic Node Classification., , , , and . IEEE Access, (2020)Intervention algorithm for malicious information in online social networks based on trusted regulator., , , , and . Int. J. Wirel. Mob. Comput., 18 (4): 343-351 (2020)An Novel Message Delivery Mechanism in Opportunistic Networks., , , , , and . HCC, volume 8944 of Lecture Notes in Computer Science, page 900-909. Springer, (2014)A Survey of Algorithms and Applications Related with Graph Embedding., , , and . CIAT, page 181-185. ACM, (2020)Reverse Intervention for Dealing with Malicious Information in Online Social Networks., and . Comput. Informatics, 39 (1): 156-173 (2020)