Author of the publication

Learning and Adapting Diverse Representations for Cross-domain Few-shot Learning.

, , , , and . ICDM (Workshops), page 294-303. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Quantitative Approach for Memory Fragmentation in Mobile Systems., , , and . SmartCom, volume 10135 of Lecture Notes in Computer Science, page 339-349. Springer, (2016)New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA., , and . Inscrypt, volume 5487 of Lecture Notes in Computer Science, page 253-264. Springer, (2008)P2P traffic identification and optimization using fuzzy c-means clustering., and . FUZZ-IEEE, page 2245-2252. IEEE, (2011)Realistic Task Parallelization of the H.264 Decoding Algorithm for Multiprocessors., , , , , , , , , and . HPCC/CSS/ICESS, page 871-874. IEEE, (2015)TLC-FTL: Workload-Aware Flash Translation Layer for TLC/SLC Dual-Mode Flash Memory in Embedded Systems., , , , and . HPCC/CSS/ICESS, page 831-834. IEEE, (2015)Balloonfish: Utilizing morphable resistive memory in mobile virtualization., , , , , and . ASP-DAC, page 322-327. IEEE, (2015)Feature Extraction and Identification of Pipeline Intrusion Based on Phase-Sensitive Optical Time Domain Reflectometer., , , and . WISATS (1), volume 280 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 665-675. Springer, (2019)Availability Analysis Method of Multilevel Security Models with Credibility Characteristics, , , and . Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on, 1, page 175-178. (April 2009)Parallel program design for JPEG compression encoding., and . FSKD, page 2502-2506. IEEE, (2012)Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem., , and . J. Comput. Sci. Technol., 22 (1): 92-94 (2007)