Author of the publication

Removing Stray Noise Quickly from Point Cloud Data Based on Sheep Model.

, , , , and . CCTA, volume 509 of IFIP Advances in Information and Communication Technology, page 435-441. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Residual Split Directed Graph Convolutional Neural Networks for Action Recognition., , , , and . IEEE Multim., 27 (4): 9-17 (2020)Integrating novel engineering strategies into STEM education: APP design and an assessment of engineering-related attitudes., and . Br. J. Educ. Technol., 51 (6): 1938-1959 (2020)Decompilation Based Deep Binary-Source Function Matching., , , , , , and . SciSec, volume 14299 of Lecture Notes in Computer Science, page 244-260. Springer, (2023)Research on Error Compensation for Oil Drilling Angle Based on ANFIS., , and . ICIC (2), volume 4682 of Lecture Notes in Computer Science, page 730-737. Springer, (2007)Removing Stray Noise Quickly from Point Cloud Data Based on Sheep Model., , , , and . CCTA, volume 509 of IFIP Advances in Information and Communication Technology, page 435-441. Springer, (2016)Image Segmentation of LBF Model with Variable Coefficient Regularized Area Term., , and . CSPS (2), volume 516 of Lecture Notes in Electrical Engineering, page 227-235. Springer, (2018)A Robust Image Denoising Method With Multiview Texture-Aware Convolutional Neural Networks., , and . IEEE Multim., 29 (3): 80-90 (2022)Progressively Helical Multi-Omics Data Fusion GCN and Its Application in Lung Adenocarcinoma., , , , , , and . IEEE Access, (2023)Masked Prompt Learning for Formal Analogies beyond Words., and . IARML@IJCAI, volume 3174 of CEUR Workshop Proceedings, page 1-14. CEUR-WS.org, (2022)A semantics aware approach to automated reverse engineering unknown protocols., , , , , , , , and . ICNP, page 1-10. IEEE Computer Society, (2012)