From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Outsourced KP-ABE with Enhanced Security., , и . INTRUST, том 9473 из Lecture Notes in Computer Science, стр. 36-50. Springer, (2014)Managing and Collaboratively Processing Medical Image via the Web., , , , , и . WAIM Workshops, том 7419 из Lecture Notes in Computer Science, стр. 252-263. Springer, (2012)A general image representation scheme and its improvement for image analysis., , и . ICSAI, стр. 736-741. IEEE, (2014)A bio-inspired model of image representation based on non-classical receptive fields., , и . ICSAI, стр. 730-735. IEEE, (2014)A computational trust model for access control in P2P.. Sci. China Inf. Sci., 53 (5): 896-910 (2010)GIGAN: Self-supervised GAN for generating the invisible using cycle transformation and conditional normalization., и . IET Image Process., 17 (9): 2736-2747 (2023)Enhancing Heterogeneous Graph Contrastive Learning with Strongly Correlated Subgraphs., и . ICONIP (6), том 14452 из Lecture Notes in Computer Science, стр. 86-102. Springer, (2023)A Combined Music Label Propagation Model., , и . CIS, стр. 1251-1255. IEEE Computer Society, (2011)Efficient semi-supervised annotation with Proxy-based Local Consistency Propagation., , , и . ICME, стр. 1-6. IEEE Computer Society, (2013)Reciprocal Hash Tables for Nearest Neighbor Search., , и . AAAI, стр. 626-632. AAAI Press, (2013)