Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revisiting frequency-smoothing encryption: new security definitions and efficient construction., , and . Cybersecur., 7 (1): 15 (December 2024)Self-Supervised Video Desmoking for Laparoscopic Surgery., , , , , , , and . CoRR, (2024)Invalid Message Risks and Analysis of Laws to Restrict Cyber Crime in Social Applications., , and . ICNCC, page 341-347. ACM, (2022)COCAS+: Large-Scale Clothes-Changing Person Re-Identification With Clothes Templates., , , , , , , and . IEEE Trans. Circuits Syst. Video Technol., 33 (4): 1839-1853 (April 2023)A Secure Order-Preserving Encryption Scheme Based on Encrypted Index., , and . APWeb/WAIM (3), volume 13423 of Lecture Notes in Computer Science, page 247-261. Springer, (2022)Cross-Modal Retrieval with Heterogeneous Graph Embedding., , , , , and . ACM Multimedia, page 3291-3300. ACM, (2022)Research on Information Extraction of LCSTS Dataset Based on an Improved BERTSum-LSTM Model., , , , , and . CoRR, (2024)Neighbourhood-guided Feature Reconstruction for Occluded Person Re-Identification., , , , and . CoRR, (2021)Improvement on fuzzy-model-based stability criteria of nonlinear networked control systems., , , and . FUZZ-IEEE, page 695-700. IEEE, (2014)Multiple Domain Experts Collaborative Learning: Multi-Source Domain Generalization For Person Re-Identification., , , , , , , and . CoRR, (2021)