Author of the publication

The Tenth Visual Object Tracking VOT2022 Challenge Results.

, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and . ECCV Workshops (8), volume 13808 of Lecture Notes in Computer Science, page 431-460. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Paternalistic Leadership Influences IT Security Policy Compliance: The Mediating Role of the Social Bond., , , and . J. AIS, 20 (11): 2 (2019)Toward Generalist Anomaly Detection via In-context Residual Learning with Few-shot Sample Prompts., and . CoRR, (2024)Transformer Tracking., , , , , and . CVPR, page 8126-8135. Computer Vision Foundation / IEEE, (2021)Predicting Users' Age Range in Micro-blog Network., , , , , and . WISE (1), volume 8180 of Lecture Notes in Computer Science, page 516-521. Springer, (2013)Will Security and Privacy Updates Affect Users' Privacy Choices of Mobile Apps., , , and . PACIS, page 209. (2023)DCPT: Darkness Clue-Prompted Tracking in Nighttime UAVs., , , , , , , and . CoRR, (2023)AutoChart: A Dataset for Chart-to-Text Generation Task., , , , and . RANLP, page 1636-1644. INCOMA Ltd., (2021)Anomaly Heterogeneity Learning for Open-set Supervised Anomaly Detection., , , and . CoRR, (2023)Tracking Anything in High Quality., , , , , , , , , and 2 other author(s). CoRR, (2023)3rd Place Solution for PVUW2023 VSS Track: A Large Model for Semantic Segmentation on VSPW., , , , , , , , and . CoRR, (2023)