Author of the publication

Deep Image Compression via End-to-End Learning.

, , , , and . CVPR Workshops, page 2575-2578. Computer Vision Foundation / IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Asynchronous Event-Triggered Output-Feedback Control of Singular Markov Jump Systems., , , , and . IEEE Trans. Cybern., 53 (11): 7342-7352 (November 2023)Asynchronous Control of Two-Dimensional Markov Jump Roesser Systems: An Event-Triggering Strategy., and . IEEE Trans. Netw. Sci. Eng., 9 (4): 2278-2289 (2022)Temporal-spatial distribution of wave energy: A case study of Beibu Gulf, China, , , , and . Renewable Energy, (February 2015)A Use Case Modeling Approach to Facilitate the Transition towards Analysis Models: Concepts and Empirical Evaluation., , and . MoDELS, volume 5795 of Lecture Notes in Computer Science, page 484-498. Springer, (2009)Multispectral focal stack acquisition using a chromatic aberration enlarged camera., , , , , , , and . ICIP, page 1627-1631. IEEE, (2017)Fabrication and self-assembly of movable microstructures embedding cells with concentration control inside microfluidic devices., , , , and . MHS, page 169-174. IEEE, (2012)Model-based security engineering for cyber-physical systems: A systematic mapping study., , and . Inf. Softw. Technol., (2017)A generic framework for deriving architecture modeling methods for large-scale software-intensive systems., , and . SAC, page 1750-1757. ACM, (2013)FPGA-based remotely sensed imagery denoising., , , , , , , and . IGARSS, page 525-528. IEEE, (2015)On Modeling Malware Propagation in Interest-Based Overlapping Communities., , , and . ICC, page 1-6. IEEE, (2019)