Author of the publication

Pedestrian Crossing Action Recognition and Trajectory Prediction with 3D Human Keypoints.

, , , , , , , , , , , and . ICRA, page 1463-1470. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks., , and . GLOBECOM, page 1-8. IEEE, (2009)A fast quantum mechanics based contour extraction algorithm., , and . Medical Imaging: Image Processing, volume 7259 of SPIE Proceedings, page 72594C. SPIE, (2009)Resource Allocation and Performance Study for LTE Networks Integrated with Femtocells., , , and . GLOBECOM, page 1-6. IEEE, (2010)Mean Shift Spectral Clustering for Perceptual Image Segmentation., , and . ICASSP (2), page 117-120. IEEE, (2006)Dynamic Performance Evaluation of Grid-Following and Grid-Forming Inverters for Frequency Support in Low Inertia Transmission Grids., , , and . ISGT-Europe, page 1-5. IEEE, (2021)Trace Finger Kinematics from Surface Electromyography by Using Kalman Decoding Method., , , , , and . CBS, page 153-158. IEEE, (2023)Multi-agent Covering Option Discovery through Kronecker Product of Factor Graphs., , , and . AAMAS, page 1572-1574. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), (2022)Development of Tendon Driven Under-Actuated Mechanism Applied in an EMG Prosthetic Hand with Three Major Grasps for Daily Life., , , , , , and . IROS, page 2774-2779. IEEE, (2018)StatSym: Vulnerable Path Discovery through Statistics-Guided Symbolic Execution., , , , , and . DSN, page 109-120. IEEE Computer Society, (2017)CRED: Cloud Right-Sizing to Meet Execution Deadlines and Data Locality., , , and . CLOUD, page 686-693. IEEE Computer Society, (2016)