Author of the publication

Unsupervised Domain Adaptation using Deep Networks with Cross-Grafted Stacks.

, , , and . ICCV Workshops, page 3257-3264. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Post-processing Method to Improve the Ability of Reconstruction for Video Leaking Signal., , , and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 141-151. Springer, (2015)A topography structure used in audio steganography., , , and . ICASSP, page 2134-2138. IEEE, (2016)A Combined Time Diversity Blind Equalization Algorithm Based on Orthogonal Wavelet Transform., and . ISIA, volume 86 of Communications in Computer and Information Science, page 275-281. Springer, (2010)Deep adversarial transition learning using cross-grafted generative stacks, , , and . Neural Networks, (2022)Semi-Supervised Semantic Segmentation of Vessel Images using Leaking Perturbations., , and . WACV, page 1769-1778. IEEE, (2022)Cross-Domain Latent Modulation for Variational Transfer Learning., , , and . WACV, page 3148-3157. IEEE, (2021)Unsupervised Domain Adaptation using Deep Networks with Cross-Grafted Stacks., , , and . ICCV Workshops, page 3257-3264. IEEE, (2019)Cross-Domain Latent Modulation for Variational Transfer Learning., , , and . CoRR, (2020)POSTER: A Security Adaptive Steganography System Applied on Digital Audio., , , and . SecureComm, volume 164 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 567-571. Springer, (2015)