Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware Trojans: Threats, Detection, and Prevention., , , , , , and . ICBAR, page 529-533. ACM, (2023)Human Pose Recommendation and Professionalization., , , , and . MCGE@MM, page 91-98. ACM, (2023)Language Guidance Generation Using Aesthetic Attribute Comparison for Human Photography and AIGC., , , , , and . MCGE@MM, page 127-135. ACM, (2023)Innovation of Practical Training Mode in Special Industry Education Based on Intelligent Base Industry-Teaching Integration., , , , , , , and . ICIEAI, page 728-732. ACM, (2023)Predicting Scores of Various Aesthetic Attribute Sets by Learning from Overall Score Labels., , , , , , , and . MCGE@MM, page 63-71. ACM, (2024)Research and Implementation of Dynamic Migration of SoftMan Based on Group Management Strategies., , and . CSIE (5), page 728-732. IEEE Computer Society, (2009)Aesthetic Attribute Assessment of Images Numerically on Mixed Multi-attribute Datasets., , , , , , , and . CoRR, (2022)Single Reference Image based Scene Relighting via Material Guided Filtering., , , , , , and . CoRR, (2017)Aesthetic Evaluation and Guidance for Mobile Photography., , , and . ACM Multimedia, page 2780-2782. ACM, (2021)A Controllable Pipeline Framework of Block Ciphers on GPU for Streaming Data., , , and . IEEE Access, (2023)