Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Malicious SIM Cards Identification Method Based on Telecom Big Data Analytics., , , , , , and . ICCDE, page 136-141. ACM, (2020)The accurate particle tracer code., , , , and . Comput. Phys. Commun., (2017)Scene Graph Semantic Inference for Image and Text Matching., , , , and . ACM Trans. Asian Low Resour. Lang. Inf. Process., 22 (5): 144:1-144:23 (May 2023)Wireless Communication Using Metal Reflectors: Reflection Modelling and Experimental Verification., , , , and . ICC, page 4701-4706. IEEE, (2023)EagleQR: An Application in Accessing Printed Text for the Elderly and Low Vision People., , , , and . Big Data (CCF), volume 1120 of Communications in Computer and Information Science, page 420-430. Springer, (2019)Multi-label Classification of Road Cracks Based on Semantic-Aware Mixup., , and . CIPAE, page 8-12. IEEE, (2023)H2MN: Graph Similarity Learning with Hierarchical Hypergraph Matching Networks., , , , , , and . KDD, page 2274-2284. ACM, (2021)LORE: Logical Location Regression Network for Table Structure Recognition., , , , , , , and . AAAI, page 2992-3000. AAAI Press, (2023)Contour information regularized tensor ring completion for realistic image restoration., , , and . IET Image Process., 16 (13): 3499-3506 (2022)Dynamic data-free knowledge distillation by easy-to-hard learning strategy., , , , , and . Inf. Sci., (2023)