Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Person Re-Identification Performance Through In Vivo Learning., , , , , and . IEEE Trans. Image Process., (2024)Meta Clothing Status Calibration for Long-Term Person Re-Identification., , , , , , and . IEEE Trans. Image Process., (2024)ParaModel: a visual modeling and code skeleton generation system for programming parallel applications., , , , , and . ACM SIGPLAN Notices, 43 (4): 4-10 (2008)IoT Based Door Lock Surveillance System Using Cryptographic Algorithms., , and . ICNSC, page 448-453. IEEE, (2019)Visual Simulation of Anti-Terrorism Emergency Response Based on Unity3D., and . ICNSC, page 132-137. IEEE, (2019)Cloaking locations for anonymous location based services: a hybrid approach., and . GeoInformatica, 13 (2): 159-182 (2009)Guest editorial: special issue on spatial computing in emergency management., , , , and . GeoInformatica, 22 (2): 307-309 (2018)Cross-Efficiency Evaluation Method Taking Management Objectives as Reference Points from Peer Perspective., , , and . Asia Pac. J. Oper. Res., 39 (6): 2150040:1-2150040:26 (December 2022)Error analysis of range-based localisation algorithms in wireless sensor networks., , , , and . Int. J. Sens. Networks, 12 (2): 78-88 (2012)Adaptive super-resolution for person re-identification with low-resolution images., , , , and . Pattern Recognit., (2021)