Author of the publication

SPIN: Structure-Preserving Inner Offset Network for Scene Text Recognition.

, , , , , , and . AAAI, page 3305-3314. AAAI Press, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Encrypted Malicious Traffic Detection System Based on Neural Network., , , and . CyberC, page 62-70. IEEE, (2019)Targeted Local Immunization in Scale-Free Peer-to-Peer Networks., , and . J. Comput. Sci. Technol., 22 (3): 457-468 (2007)Tracing Tor Hidden Service Through Protocol Characteristics., , , and . ICCCN, page 1-9. IEEE, (2022)pXRepository: A Peer-to-Peer XML Repository for Web Service Discovery., , , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 137-144. Springer, (2004)Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs., , and . TrustCom, page 540-547. IEEE, (2021)Breaking Tor's Anonymity by Modifying Cell's Command., , , and . ISCC, page 1-7. IEEE, (2022)Effect of Links on DHT Routing Algorithms., , , and . GCC (1), volume 3032 of Lecture Notes in Computer Science, page 308-315. Springer, (2003)Using the Linking Model to Understand the Performance of DHT Routing Algorithms., , , , and . ISPA, volume 3358 of Lecture Notes in Computer Science, page 544-549. Springer, (2004)Adversarial Seeded Sequence Growing for Weakly-Supervised Temporal Action Localization., , , , , , and . ACM Multimedia, page 738-746. ACM, (2019)Towards High Transferability on Neural Network for Black-Box Adversarial Attacks., , , and . SecureComm, volume 462 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 72-88. Springer, (2022)