Author of the publication

DPE: Disentanglement of Pose and Expression for General Video Portrait Editing.

, , , , , , and . CVPR, page 427-436. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint Resource Allocation and Task Offloading for Hybrid NOMA-assisted MEC Network with Network Slicing., , , , and . ICACT, page 164-170. IEEE, (2023)Optimal reservoir operation using a hybrid Simulated Annealing Algorithm-Genetic Algorithm., , , and . BIC-TA, page 454-458. IEEE, (2010)Research on information sharing values of supply chain management., , , and . Kybernetes, 41 (9): 1185-1191 (2012)The LAMOST Survey of Background Quasars in the Vicinity Fields of the M 31 and M 33 - III. Results from the 2013 Regular Survey, , , , , , , , , and . (2015)cite arxiv:1505.08064Comment: 12 pages, 6 figures, Accepted for publication in a special issue of Research in Astronomy and Astrophysics on LAMOST sciences.A family of the local convergence of the improved secant methods for nonlinear equality constrained optimization subject to bounds on variables., and . J. Systems Science & Complexity, 27 (2): 307-326 (2014)Collective Intelligence - How Collaborative Contents and Social Media Changing the Face of Digital Library., , and . WEBIST, page 349-354. SciTePress, (2013)NATsDB: Natural Antisense Transcripts DataBase., , , , , and . Nucleic Acids Res., 35 (Database-Issue): 156-161 (2007)Yang-Baxterizations, Universal Quantum Gates and Hamiltonians., , and . Quantum Inf. Process., 4 (3): 159-197 (2005)Iterative Subspace Screening for Rapid Sparse Estimation of Brain Tissue Microstructural Properties., , and . MICCAI (1), volume 9349 of Lecture Notes in Computer Science, page 223-230. Springer, (2015)A map traceability management scheme for security control., , , and . Enterprise IS, 14 (3): 388-401 (2020)