Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Thieno3,4-bthiophene-Based Non-fullerene Electron Acceptor for High-Performance Bulk-Heterojunction Organic Solar Cells, , , , , , and . Journal of the American Chemical Society, 138 (48): 15523-15526 (2016)PMID: 27934020.Efficient Semitransparent Solar Cells with High NIR Responsiveness Enabled by a Small-Bandgap Electron Acceptor, , , , , , , , and . Advanced Materials, 29 (21): n/a--n/a (2017)Query-specific optimal convolutional neural ranker., , and . Neural Comput. Appl., 31 (7): 3107-3116 (2019)A New Construction of Tagged Visual Cryptography Scheme., , , , and . IWDW, volume 9569 of Lecture Notes in Computer Science, page 433-445. Springer, (2015)Research on Quality Control of Marine Monitoring Data Based on Extreme Learning Machine., , , , , and . ICAIS (1), volume 12239 of Lecture Notes in Computer Science, page 327-338. Springer, (2020)Research on Smart Care System for Elder Sojourners.. HCI (28), volume 12208 of Lecture Notes in Computer Science, page 113-127. Springer, (2020)Butterfly: A Panacea for All Difficulties in Wildly Unsupervised Domain Adaptation., , , , , and . CoRR, (2019)Distance-alignment based adaptive MAC protocol for underwater acoustic networks., , and . WCNC, page 1-6. IEEE, (2016)Re-cinematography: Improving the camerawork of casual video., and . ACM Trans. Multim. Comput. Commun. Appl., 5 (1): 2:1-2:28 (2008)Flexible Visual Cryptography Scheme without Distortion., , , and . IWDW, volume 7128 of Lecture Notes in Computer Science, page 211-227. Springer, (2011)