Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Anomaly Detection Using Small Training Sets., , , and . IDEAL, volume 3578 of Lecture Notes in Computer Science, page 258-263. Springer, (2005)A Vicarious Words Method for Word Sense Discrimination., , and . ICIC (1), volume 5226 of Lecture Notes in Computer Science, page 397-404. Springer, (2008)Speech Hiding Based on Auditory Wavelet., , , and . ICCSA (4), volume 3046 of Lecture Notes in Computer Science, page 414-420. Springer, (2004)Boundary Processing of HHT Using Support Vector Regression Machines., , and . International Conference on Computational Science (3), volume 4489 of Lecture Notes in Computer Science, page 174-177. Springer, (2007)Integration of Global and Local Knowledge for Foreground Enhancing in Weakly Supervised Temporal Action Localization., , , and . IEEE Trans. Multim., (2024)FPN with GMM Based Feature Enhancement Strategy for Object Detection in Remote Sensing Images., , , , , , and . ICASSP, page 3420-3424. IEEE, (2024)A new approach for structural credit assignment in distributed reinforcement learning systems., , and . ICRA, page 1215-1220. IEEE, (2003)Response threshold model of aggregation in a swarm: A theoretical and simulative comparison., , and . IEEE Congress on Evolutionary Computation, page 1103-1109. IEEE, (2008)Situation Cognitive in Adjustable Autonomy System Theory and Application., and . ICSI (2), volume 7332 of Lecture Notes in Computer Science, page 308-315. Springer, (2012)A Speech Stream Detection in Adverse Acoustic Environments Based on Cross Correlation Technique., , , and . ICNC (2), volume 4222 of Lecture Notes in Computer Science, page 664-667. Springer, (2006)