Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IoT Based Door Lock Surveillance System Using Cryptographic Algorithms., , and . ICNSC, page 448-453. IEEE, (2019)Visual Simulation of Anti-Terrorism Emergency Response Based on Unity3D., and . ICNSC, page 132-137. IEEE, (2019)Progress on Mandarin conversational telephone speech recognition., , , , , , , , , and 2 other author(s). ISCSLP, page 1-4. IEEE, (2004)Multi-task deep neural network for multi-label learning., , , and . ICIP, page 2897-2900. IEEE, (2013)Data-Driven Promotion Planning for Paid Mobile Applications., , and . Inf. Syst. Res., 31 (3): 1007-1029 (2020)Part-aligned pose-guided recurrent network for action recognition., , , and . Pattern Recognit., (2019)Fusing Two Directions in Cross-Domain Adaption for Real Life Person Search by Language., , and . ICCV Workshops, page 1815-1818. IEEE, (2019)ACMM: Aligned Cross-Modal Memory for Few-Shot Image and Sentence Matching., and . ICCV, page 5773-5782. IEEE, (2019)Knowledge Base Error Detection with Relation Sensitive Embedding., , , , , and . DASFAA (1), volume 11446 of Lecture Notes in Computer Science, page 725-741. Springer, (2019)Risk Assessment of Private Information Inference for Motion Sensor Embedded IoT Devices., , , , , and . IEEE Trans. Emerg. Top. Comput. Intell., 4 (3): 265-275 (2020)