Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting the Degree of Anomal in Security Video., , , , and . MVA, page 53-56. (2007)Auto coder-decoder (CODEC) model based sparse representation for image super resolution., , , , and . CISP-BMEI, page 1-6. IEEE, (2017)Graph-structured multitask sparsity model for visual tracking., , , , , and . Inf. Sci., (2019)Fast visual object tracking via distortion-suppressed correlation filtering., and . ISC2, page 1-6. IEEE, (2016)Quantitative Measurement for Fuzzy System to Input and Rule Perturbations., , and . ICIC (2), volume 4114 of Lecture Notes in Computer Science, page 159-164. Springer, (2006)Converted-face identification: using synthesized images to replace original images for recognition., , , and . Multim. Tools Appl., 76 (5): 6641-6661 (2017)IBP: An Index-Based XML Parser Model., , , and . NPC, volume 3779 of Lecture Notes in Computer Science, page 65-71. Springer, (2005)Geometry Assisted Energy Efficient Sweep Coverage Algorithm For Wireless Sensor Networks., , , and . CEC, page 1005-1011. IEEE, (2021)A Nonlinear Dynamic Model for Individual Learning with Plateau Phenomenon., , , and . IC4E, page 109-115. ACM, (2020)An Offloading Algorithm of Dense-Tasks for Mobile Edge Computing., , and . icWCSN, page 35-40. ACM, (2020)