Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Augmented Lagrange Multiplier Method for Exact Recovery of Corrupted Low-Rank Matrices., , and . CoRR, (2010)Subspace Clustering Based Tag Sharing for Inductive Tag Matrix Refinement with Complex Errors., , and . SIGIR, page 1013-1016. ACM, (2016)A rank-one update algorithm for fast solving kernel Foley-Sammon optimal discriminant vectors., , and . IEEE Trans. Neural Networks, 21 (3): 393-403 (2010)Joint Dictionary Learning and Semantic Constrained Latent Subspace Projection for Cross-Modal Retrieval., , and . CIKM, page 1663-1666. ACM, (2018)Bilinear Factor Matrix Norm Minimization for Robust PCA: Algorithms and Applications., , , , and . CoRR, (2018)Towards Efficient Scene Understanding via Squeeze Reasoning., , , , , , , and . CoRR, (2020)Expectation-Maximization Attention Networks for Semantic Segmentation., , , , , and . ICCV, page 9166-9175. IEEE, (2019)Tensor Robust Principal Component Analysis with a New Tensor Nuclear Norm., , , , , and . IEEE Trans. Pattern Anal. Mach. Intell., 42 (4): 925-938 (2020)Refined Exponential Filter with Applications to Image Restoration and Interpolation., , , and . ACCV (3), volume 5996 of Lecture Notes in Computer Science, page 33-42. Springer, (2009)Long-Tail Hashing., , , , , and . SIGIR, page 1328-1338. ACM, (2021)