Author of the publication

Channel Attention Module and Weighted Local Feature Person Re-ID Network.

, , , , and . ICMLSC, page 124-128. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Video Super-Resolution Reconstruction Based on Deep Learning and Spatio-Temporal Feature Self-similarity (Extended abstract)., , , , , , and . ICDE, page 3877-3878. IEEE, (2023)A Digital Fingerprint Scheme Based on MPEG-2., , and . IIH-MSP, page 611-614. IEEE Computer Society, (2010)Efficient Membership Inference Attacks against Federated Learning via Bias Differences., , , , , , and . RAID, page 222-235. ACM, (2023)Robust Spatio-Temporal Trajectory Modeling Based on Auto-Gated Recurrent Unit., , , , , , , , and . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, page 1189-1194. IEEE, (2022)Weighted Local Feature Vehicle Re-identification Network., , and . CSAE, page 171:1-171:5. ACM, (2020)Research on Interference from 5G System to NGSO Satellite Constellation Based on K-means Clustering., , , , and . SINC, volume 1353 of Communications in Computer and Information Science, page 1-17. Springer, (2020)TGCN-DA: A Temporal Graph Convolutional Network with Data Augmentation for High Accuracy Insider Threat Detection., , , , and . TrustCom, page 1249-1257. IEEE, (2023)SSteGAN: Self-learning Steganography Based on Generative Adversarial Networks., , , , and . ICONIP (2), volume 11302 of Lecture Notes in Computer Science, page 253-264. Springer, (2018)GMFITD: Graph Meta-Learning for Effective Few-Shot Insider Threat Detection., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)A Network Combining Local Features and Attention Mechanisms for Vehicle Re-Identification., , and . AIPR, page 47-50. ACM, (2020)