Author of the publication

Deep Low Light Image Enhancement Via Multi-Scale Recursive Feature Enhancement and Curve Adjustment.

, , and . ICASSP, page 1-5. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Self-Supervised Learning Model for Unknown Internet Traffic Identification Based on Surge Period., , and . Future Internet, 14 (10): 289 (2022)PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks., , , , and . NaNA, page 5-10. IEEE Computer Society, (2017)Certificateless designated verifier proxy signature scheme for unmanned aerial vehicle networks., , , and . Sci. China Inf. Sci., (2021)Deep Low Light Image Enhancement Via Multi-Scale Recursive Feature Enhancement and Curve Adjustment., , and . ICASSP, page 1-5. IEEE, (2023)Efficient Hierarchical Data Access Control for Resource-Limited Users in Cloud-Based e-Health., , , , , , and . NaNA, page 319-324. IEEE, (2019)Asymmetric Group Key Agreement with Traitor Traceability., , and . CIS, page 347-351. IEEE Computer Society, (2010)Social relationship for physical objects., , , and . Int. J. Distributed Sens. Networks, (2018)A Practical Scheme of Merging Multiple Public Key Infrastructures in E-commerce., , , and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 1287-1294. Springer, (2005)LF-ViT: Reducing Spatial Redundancy in Vision Transformer for Efficient Image Recognition., , , , , , and . AAAI, page 2274-2284. AAAI Press, (2024)A New Public Key Certificate Revocation Scheme Based on One-Way Hash Chain., , , and . WAIM, volume 3739 of Lecture Notes in Computer Science, page 670-675. Springer, (2005)