Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Narration Framework of Chinese Ancient Fiction Images in the Digital Environment., , and . CSOC (1), volume 464 of Advances in Intelligent Systems and Computing, page 13-22. Springer, (2016)Cloud-based moving object detection for mobile devices., , , and . ICIN, page 100-102. IEEE, (2017)Automatic image annotation using feature selection based on improving quantum particle swarm optimization., and . Signal Process., (2015)Adaptive robust image watermark approach based on fuzzy comprehensive evaluation and analytic hierarchy process.. Signal Image Video Process., 6 (2): 317-324 (2012)Computer virus propagation model based on bounded rationality evolutionary game theory., , and . Secur. Commun. Networks, 6 (2): 210-218 (2013)An image denoising iterative approach based on total variation and weighting function., and . Multim. Tools Appl., 79 (29-30): 20947-20971 (2020)Robust Watermark Algorithm using Genetic Algorithm., and . J. Inf. Sci. Eng., 23 (2): 661-670 (2007)Software defect prediction model based on distance metric learning.. Soft Comput., 25 (1): 447-461 (2021)A Wavelet Packets Watermarking Algorithm Based on Chaos Encryption., , , and . ICCSA (1), volume 3980 of Lecture Notes in Computer Science, page 921-928. Springer, (2006)Cross-modal Deep Learning Applications: Audio-Visual Retrieval., , , , , , , , , and 1 other author(s). ICPR Workshops (6), volume 12666 of Lecture Notes in Computer Science, page 301-313. Springer, (2020)