Author of the publication

FingerSTR: Weak Supervised Transformer for Latent Fingerprint Segmentation.

, , , , , and . IJCB, page 1-10. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Selective Knowledge Sharing for Personalized Federated Learning Under Capacity Heterogeneity., , , , and . CoRR, (2024)A New Nonlocal Method for Ground-Based Synthetic Aperture Radar Deformation Monitoring., , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 11 (10): 3769-3781 (2018)Static and Dynamic Ensembles of Neural Networks for Solar Power Forecasting., , , and . IJCNN, page 1-8. IEEE, (2018)Accuracy and efficacy of thoracic pedicle screws in scoliosis with patient-specific drill template., , , , , , and . Medical Biol. Eng. Comput., 50 (7): 751-758 (2012)Soybean Knowledge Base (SoyKB): a web resource for soybean translational genomics., , , , , , , , , and 5 other author(s). BMC Genom., 13 (S-1): S15 (2012)Visual Servoing of Soft Robotic Arms by Binocular., , and . ICIRA (3), volume 11742 of Lecture Notes in Computer Science, page 130-143. Springer, (2019)A Robust Reorder-Time/Order-Quantity Policy Under Invisible Stock Loss., , and . IEEE Trans. Syst. Man Cybern. Syst., 47 (12): 3102-3116 (2017)POSTER: On the Capability of DNS Cache Poisoning Attacks.. ACM Conference on Computer and Communications Security, page 1523-1525. ACM, (2014)Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes., , , , , , , and . Mob. Inf. Syst., (2017)Detecting Gear Surface Defects Using Background-Weakening Method and Convolutional Neural Network., , and . J. Sensors, (2019)