Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning coherent vector fields for robust point matching under manifold regularization., , , , , and . Neurocomputing, (2016)Two-Level Stackelberg Game for IoT Computational Resource Trading Mechanism: A Smart Contract Approach., , , , and . IEEE Trans. Serv. Comput., 15 (4): 1883-1895 (2022)Trusted Multi-View Deep Learning with Opinion Aggregation., , , and . AAAI, page 7585-7593. AAAI Press, (2022)Emotion Regulation Music Recommendation Based on Feature Selection., , , , and . SoMeT, volume 337 of Frontiers in Artificial Intelligence and Applications, page 486-495. IOS Press, (2021)Weakly-supervised Cerebrovascular Segmentation Network with Shape Prior and Model Indicator., , , and . ICMR, page 668-676. ACM, (2022)Safe Multi-View Deep Classification., , , , and . AAAI, page 8870-8878. AAAI Press, (2023)Transmission of 20×440-Gb/s super-nyquist-filtered signals over 3600 km based on single-carrier 110-GBaud PDM QPSK with 100-GHz grid., , , , , , , , , and 1 other author(s). OFC, page 1-3. IEEE, (2014)Feature Patch Based Attention Model for Dental Caries Classification., , , , and . CLIP@MICCAI, volume 13746 of Lecture Notes in Computer Science, page 62-71. Springer, (2022)Roughness Approach to Color Image Segmentation through Smoothing Local Difference., , , and . RSKT, volume 6954 of Lecture Notes in Computer Science, page 434-439. Springer, (2011)On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach., , , and . CSS, volume 10581 of Lecture Notes in Computer Science, page 494-502. Springer, (2017)