Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A pedestrian detection algorithm based on improved YOLOv2., , and . CCIS, page 488-492. IEEE, (2018)WIDER Face and Pedestrian Challenge 2018: Methods and Results., , , , , , , , , and 42 other author(s). CoRR, (2019)Adaptive Massive MIMO Hybrid Precoding Based on Meta Learning., , , and . WCSP, page 189-194. IEEE, (2023)Automatic Network Architecture Search for RGB-D Semantic Segmentation., , , , , , and . ACM Multimedia, page 3777-3786. ACM, (2023)A Trust-Oriented Heuristic Scheduling Algorithm for Grid Computing., , , and . PaCT, volume 4671 of Lecture Notes in Computer Science, page 608-614. Springer, (2007)Error Evaluation of Semantic VSLAM Algorithms for Smart Farming., , , , , and . VISIGRAPP (5: VISAPP), page 801-810. SCITEPRESS, (2022)EviRank: An Evidence Based Content Trust Model for Web Spam Detection., , , , and . APWeb/WAIM Workshops, volume 4537 of Lecture Notes in Computer Science, page 299-307. Springer, (2007)Weakly Supervised Pedestrian Attribute Recognition with Attention in Latent Space., , and . PRCV (2), volume 12306 of Lecture Notes in Computer Science, page 316-327. Springer, (2020)Factoid Mining Based Content Trust Model for Information Retrieval., , , , and . PAKDD Workshops, volume 4819 of Lecture Notes in Computer Science, page 492-499. Springer, (2007)