Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Frequency and Spatial Dual Guidance for Image Dehazing., , , , , and . ECCV (19), volume 13679 of Lecture Notes in Computer Science, page 181-198. Springer, (2022)Deep Fourier-Based Exposure Correction Network with Spatial-Frequency Interaction., , , , , , , and . ECCV (19), volume 13679 of Lecture Notes in Computer Science, page 163-180. Springer, (2022)Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints., , , , , , , and . MSN, page 178-185. IEEE, (2022)Adaptively Learning Low-high Frequency Information Integration for Pan-sharpening., , , , , , and . ACM Multimedia, page 3375-3384. ACM, (2022)Asymmetric Color Transfer with Consistent Modality Learning., , , and . CVPR Workshops, page 2815-2823. IEEE, (2023)VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones., , , , , , and . INFOCOM, page 2062-2070. IEEE, (2019)Source-Free Domain Adaptation for Real-World Image Dehazing., , , , , and . ACM Multimedia, page 6645-6654. ACM, (2022)ID-Animator: Zero-Shot Identity-Preserving Human Video Generation., , , , , , , , and . CoRR, (2024)PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (2): 1228-1242 (March 2023)Stealthy and Effective Physical Adversarial Attacks in Autonomous Driving., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)