Author of the publication

Research on Deep Learning-based Semantic Segmentation Algorithm for UAV Images.

, and . EITCE, page 1579-1584. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging online behaviors for interpretable knowledge-aware patent recommendation., , , and . Internet Res., 32 (2): 568-587 (2022)Two-stream vision transformer based multi-label recognition for TCM prescriptions construction., , , , , and . Comput. Biol. Medicine, (March 2024)Study on the influencing factors of unplanned consumption in a large online promotion activity., , , and . Electron. Commer. Res., 16 (4): 453-477 (2016)A text analytics framework for understanding the relationships among host self-description, trust perception and purchase behavior on Airbnb., , and . Decis. Support Syst., (2020)A computational framework for understanding antecedents of guests' perceived trust towards hosts on Airbnb., , and . Decis. Support Syst., (2018)Metabolic characterization of the chitinolytic bacterium Serratia marcescens using a genome-scale metabolic model., , , and . BMC Bioinform., 20 (1): 227:1-227:13 (2019)DVREI: Dynamic Verifiable Retrieval Over Encrypted Images., , , , , , , and . IEEE Trans. Computers, 71 (8): 1755-1769 (2022)Pulmonary nodule diagnosis using dual-modal supervised autoencoder based on extreme learning machine., , , , and . Expert Syst. J. Knowl. Eng., (2017)Empirical Study of Face Authentication Systems Under OSNFD Attacks., , , , and . IEEE Trans. Dependable Secur. Comput., 15 (2): 231-245 (2018)Leakage Resilient Password Systems, , and . Springer Briefs in Computer Science Springer, (2015)