Author of the publication

Automatic Multi-source Data Fusion Technique of Powerline Corridor using UAV Lidar.

, , , , , and . ISC2, page 1-5. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A 40 GHz modified-Colpitts voltage controlled oscillator with increased tuning range., , , and . ISCAS (1), page 717-720. IEEE, (2003)An input information enhanced model for relation extraction., , , , and . Neural Comput. Appl., 31 (12): 9113-9126 (2019)Solving Discriminant Models Using Interior Point Algorithm., , and . CASDMKM, volume 3327 of Lecture Notes in Computer Science, page 51-60. Springer, (2004)Automatic Multi-source Data Fusion Technique of Powerline Corridor using UAV Lidar., , , , , and . ISC2, page 1-5. IEEE, (2022)A Method of Polarity Computation of Chinese Sentiment Words Based on Gaussian Distribution., , , , and . CICLing (2), volume 8404 of Lecture Notes in Computer Science, page 53-61. Springer, (2014)Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis., , , and . SEKE, page 601-606. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2015)BIT at SemEval-2017 Task 1: Using Semantic Information Space to Evaluate Semantic Textual Similarity., , , , and . SemEval@ACL, page 77-84. Association for Computational Linguistics, (2017)A Dual-role Trust Model for Social Commerce: A Guanxi Perspective., , , and . Inf. Manag., 58 (7): 103512 (2021)Catch You With Cache: Out-of-VM Introspection to Trace Malicious Executions., , and . DSN, page 326-337. IEEE, (2021)Investigating first-generation students' perceptions of library personnel, , , and . Performance Measurement and Metrics, 20 (1): 27--36 (February 2019)