Author of the publication

Exploiting Visual-based Intent Classification for Diverse Social Image Retrieval.

, and . MediaEval, volume 1984 of CEUR Workshop Proceedings, CEUR-WS.org, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the signed star domination numbers of trees., , and . Ars Comb., (2016)Security analysis of optimal multi-carrier spread-spectrum embedding., , , , and . ChinaSIP, page 851-855. IEEE, (2015)Image tampering localization via estimating the non-aligned double JPEG compression., , , and . Media Watermarking, Security, and Forensics, volume 8665 of SPIE Proceedings, page 86650R. SPIE, (2013)Dirty-Paper Coding Based Secure Transmission for Multiuser Downlink in Cellular Communication Systems., and . IEEE Trans. Vehicular Technology, 66 (7): 5947-5960 (2017)Hedging American contingent claims with arbitrage costs, and . Chaos, Solitons & Fractals, 32 (2): 598--603 (April 2007)Hedging American contingent claims with constrained portfolios under a higher interest rate for borrowing, and . Chaos, Solitons & Fractals, 24 (2): 617--625 (April 2005)UAV autonomous path optimization simulation based on radar tracking prediction., , , and . EURASIP J. Wireless Comm. and Networking, (2018)Self-Check Design for Embryonic Electronic Cell., , and . ITITS, volume 314 of Frontiers in Artificial Intelligence and Applications, page 165-174. IOS Press, (2018)SingleCaffe: An Efficient Framework for Deep Learning on a Single Node., , , , , and . IEEE Access, (2018)Practical Face Swapping Detection Based on Identity Spatial Constraints., , , and . IJCB, page 1-8. IEEE, (2021)