Author of the publication

Falsified CV Data Attack Detection Based on LSTM.

, , , , , and . HPCC/DSS/SmartCity/DependSys, page 1029-1034. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Texture classification via patch-based sparse texton learning., , , and . ICIP, page 2737-2740. IEEE, (2010)Metric-based Generative Adversarial Network., , and . ACM Multimedia, page 672-680. ACM, (2017)Practical opportunistic routing in high-speed multi-rate wireless mesh networks., , and . MobiHoc, page 127-136. ACM, (2013)Performance analysis and simplification of digital zero phase start (DZPS) employed in data storage timing recovery systems., and . GLOBECOM, page 1118-1122. IEEE, (2004)Distributed semi-supervised learning algorithm based on extreme learning machine over networks using event-triggered communication scheme., , and . Neural Networks, (2019)Stereo Refinement Dehazing Network., , , , and . IEEE Trans. Circuits Syst. Video Technol., 32 (6): 3334-3345 (2022)SED: A Simple Encoder-Decoder for Open-Vocabulary Semantic Segmentation., , , , and . CoRR, (2023)Human-in-the-loop image segmentation and annotation., , , and . Sci. China Inf. Sci., (2020)Energy Efficient Resource Allocation for Wireless Powered UAV Wireless Communication System With Short Packet., , , and . IEEE Trans. Green Commun. Netw., 7 (1): 101-113 (March 2023)Image decomposition based matrix regression with applications to robust face recognition., , , , , and . Pattern Recognit., (2020)