Author of the publication

Exploiting Category-Level Semantic Relationships for Fine-Grained Image Recognition.

, , , , , and . PRCV (1), volume 11857 of Lecture Notes in Computer Science, page 50-62. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Projection algorithms for nonconvex minimization with application to sparse principal component analysis., , and . J. Glob. Optim., 65 (4): 657-676 (2016)Causal Deconfounding via Confounder Disentanglement for Dual-Target Cross-Domain Recommendation., , , and . CoRR, (2024)Distribution-Aware Hierarchical Weighting Method for Deep Metric Learning., , , , , and . ICASSP, page 1770-1774. IEEE, (2021)Exploiting Category-Level Semantic Relationships for Fine-Grained Image Recognition., , , , , and . PRCV (1), volume 11857 of Lecture Notes in Computer Science, page 50-62. Springer, (2019)Adaptive unified defense framework for tackling adversarial audio attacks., , , and . Artif. Intell. Rev., 57 (8): 218 (August 2024)Deep Learning Gradient Visualization-Based Pre-Silicon Side-Channel Leakage Location., , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Bounded Budget Betweenness Centrality Game for Strategic Network Formations., , , , and . ESA, volume 5757 of Lecture Notes in Computer Science, page 227-238. Springer, (2009)TSCL: A time-space crossing location for side-channel leakage detection., , , , and . Comput. Networks, (2022)An active contour model based on adaptively variable exponent combining Legendre polynomial for image segmentation., , , , , and . Multim. Tools Appl., 81 (19): 27495-27522 (2022)Single-Trace Side-Channel Attacks on the Toom-Cook: The Case Study of Saber., , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (4): 285-310 (2022)