Author of the publication

An improved target detection algorithm applied to domestic edge computing module.

, , , , , , and . ICCEIC, page 329-333. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Argumentation-Based Approach to Assist in the Investigation and Attribution of Cyber-Attacks., , and . CoRR, (2019)Deep neural network watermarking based on a reversible image hiding network., , and . Pattern Anal. Appl., 26 (3): 861-874 (August 2023)Visualization and assessment of model selection uncertainty., , , and . Comput. Stat. Data Anal., (2023)CARE-30: A Causally Driven Multi-Modal Model for Enhanced 30-Day ICU Readmission Predictions., , , , , and . BIBM, page 1509-1516. IEEE, (2023)Gesture Recognition Based on Deep Belief Networks., , , and . CCBR, volume 10568 of Lecture Notes in Computer Science, page 439-446. Springer, (2017)Active Authorization Control of Deep Models Using Channel Pruning., , , and . ChineseCSCW (2), volume 1682 of Communications in Computer and Information Science, page 530-542. Springer, (2022)Computing-aware Proactive Network Reconfiguration for Optical Networks Interconnected Edge Computing System., , , and . OFC, page 1-3. IEEE, (2021)Helping Forensic Analysts to Attribute Cyber-Attacks: An Argumentation-Based Reasoner., , , and . PRIMA, volume 11224 of Lecture Notes in Computer Science, page 510-518. Springer, (2018)Meta-transfer Learning for Person Re-identification in Aerial Imagery., , , and . ChineseCSCW (2), volume 1682 of Communications in Computer and Information Science, page 634-644. Springer, (2022)An improved target detection algorithm applied to domestic edge computing module., , , , , , and . ICCEIC, page 329-333. IEEE, (2023)