Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Open Category Detection with PAC Guarantees, , , , and . (2018)cite arxiv:1808.00529.Beauty eMakeup: A Deep Makeup Transfer System., , , and . ACM Multimedia, page 701-702. ACM, (2016)Event Space-Correlation Analysis Algorithm Based on Ant Colony Optimization., , and . ICIC (1), volume 9771 of Lecture Notes in Computer Science, page 563-570. Springer, (2016)Weakly Supervised Graph Propagation Towards Collective Image Parsing., , , , , and . IEEE Trans. Multim., 14 (2): 361-373 (2012)A HEVC Steganography Method Based on QDCT Coefficient., , , , and . ICIC (3), volume 12465 of Lecture Notes in Computer Science, page 624-632. Springer, (2020)The NWSC benchmark suite using scientific throughput to measure supercomputer performance., , , , and . SC State of the Practice Reports, page 7:1-7:5. ACM, (2011)A Video Steganography Method Based on Transform Block Decision for H.265/HEVC., , , , and . IEEE Access, (2021)"Wow! you are so beautiful today!"., , , , , and . ACM Multimedia, page 437-438. ACM, (2013)Hiding Bitcoin Transaction Information Based on HEVC., , , , and . SmartBlock, volume 11373 of Lecture Notes in Computer Science, page 1-11. Springer, (2018)Discriminative Triad Matching and Reconstruction for Weakly Referring Expression Grounding., , , , and . CoRR, (2021)