Author of the publication

Source-free domain adaptive object detection based on pseudo-supervised mean teacher.

, , , , , , and . J. Supercomput., 79 (6): 6228-6251 (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

One optimized I/O configuration per HPC application: leveraging the configurability of cloud., , , , and . APSys, page 15. ACM, (2011)Visual tracking using sequential importance sampling with a state partition technique., , , , and . ICIP (3), page 876-879. IEEE, (2005)Target Tracking using a Particle Filter Based on the Projection Method., , and . ICASSP (3), page 1189-1192. IEEE, (2007)A novel nonlinear state estimation technique based on sequential importance sampling and parallel filter banks., and . CCA, page 1606-1611. IEEE, (2005)Image restoration using a hybrid combination of particle filtering and wavelet denoising., , , , and . ICIP (2), page 790-793. IEEE, (2005)Integrating IDS Alert Correlation and OS-Level Dependency Tracking., , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 272-284. Springer, (2006)Reasoning About Complementary Intrusion Evidence., , , and . ACSAC, page 39-48. IEEE Computer Society, (2004)Employing Checkpoint to Improve Job Scheduling in Large-Scale Systems., , , , , , and . JSSPP, volume 7698 of Lecture Notes in Computer Science, page 36-55. Springer, (2012)HaPPy: Hyperthread-aware Power Profiling Dynamically., , , , and . USENIX ATC, page 211-217. USENIX Association, (2014)Automatic diagnosis and response to memory corruption vulnerabilities., , , , and . CCS, page 223-234. ACM, (2005)