Author of the publication

SC-Conv: Sparse-Complementary Convolution for Efficient Model Utilization on CNNs.

, , , and . ISM, page 97-100. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic detection of inter-application communication vulnerabilities in Android., , and . ISSTA, page 118-128. ACM, (2015)More Is Less: Learning Efficient Video Representations by Big-Little Network and Depthwise Temporal Aggregation., , , , and . NeurIPS, page 2261-2270. (2019)UI X-Ray: Interactive Mobile UI Testing Based on Computer Vision., , , , , and . IUI, page 245-255. ACM, (2017)Parallelization of Classical Numerical optimization in Quantum Variational Algorithms., , , , and . ICST, page 309-320. IEEE, (2020)Absolute Variation Distance: An Inversion Attack Evaluation Metric for Federated Learning., , , and . ECIR (4), volume 14611 of Lecture Notes in Computer Science, page 243-256. Springer, (2024)Ranking Distance Metric for Privacy Budget in Distributed Learning of Finite Embedding Data., , , and . ECIR (4), volume 14611 of Lecture Notes in Computer Science, page 257-269. Springer, (2024)Saving the world wide web from vulnerable JavaScript., , , , , and . ISSTA, page 177-187. ACM, (2011)A framework for automatic anomaly detection in mobile applications., , , and . MOBILESoft, page 297-298. ACM, (2016)Improving design validation of mobile application user interface implementation., , , and . MOBILESoft, page 277-278. ACM, (2016)Static Specification Mining Using Automata-Based Abstractions., , , and . IEEE Trans. Software Eng., 34 (5): 651-666 (2008)