Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bandgap engineering of two-dimensional semiconductor materials, , , , , , , , , and 11 other author(s). NPJ 2D MATERIALS AND APPLICATIONS, (2020)A super resolution frontal face generation model based on 3DDFA and CBAM., , and . Displays, (2021)SigFree: A Signature-free Buffer Overflow Attack Blocker., , , and . USENIX Security Symposium, USENIX Association, (2006)Control of Ski Robot Based on Deep Reinforcement Learning., , , and . SPAC, page 211-215. IEEE, (2021)A Data-Efficient Model-Based Learning Framework for the Closed-Loop Control of Continuum Robots., and . RoboSoft, page 247-254. IEEE, (2022)Part-level fully convolutional networks for pedestrian detection., , and . ICASSP, page 2267-2271. IEEE, (2017)Generation of temperature gradient on microfluidic plant chip for high-throughput plant phenotyping., , , and . NEMS, page 398-401. IEEE, (2017)Automated microfluidic plant chips-based plant phenotyping system., , , , , and . NEMS, page 756-760. IEEE, (2017)Hierarchical Visual Attribute Learning in the Wild., , , , and . ACM Multimedia, page 3415-3423. ACM, (2023)Detecting Remote Exploits Using Data Mining., , , , , and . IFIP Int. Conf. Digital Forensics, volume 285 of IFIP, page 177-189. Springer, (2008)