Author of the publication

ET-GAN: Cross-Language Emotion Transfer Based on Cycle-Consistent Generative Adversarial Networks.

, , , , , , and . ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 2038-2045. IOS Press, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prediction-based Dynamic Resource Scheduling for Virtualized Cloud Systems., , , , , and . J. Networks, 9 (2): 375-383 (2014)Reducing Operational Costs through Consolidation with Resource Prediction in the Cloud., , , , , , and . CCGRID, page 793-798. IEEE Computer Society, (2012)Powerful Speaker Embedding Training Framework by Adversarially Disentangled Identity Representation., , and . CoRR, (2019)Cost-efficient task scheduling for executing large programs in the cloud., , , , , and . Parallel Comput., 39 (4-5): 177-188 (2013)A Light-Weight and Accurate Method of Static Integer-Overflow-to-Buffer-Overflow Vulnerability Detection., , , , , , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 404-423. Springer, (2018)SEEF-ALDR: A Speaker Embedding Enhancement Framework via Adversarial Learning based Disentangled Representation., , , , , and . ACSAC, page 939-950. ACM, (2020)HClave: An isolated execution environment design for hypervisor runtime security., , , , , , , , , and . Comput. Secur., (2024)Cost-Conscious Scheduling for Large Graph Processing in the Cloud., , , , and . HPCC, page 808-813. IEEE, (2011)Clustering Approach Based on Mini Batch Kmeans for Intrusion Detection System Over Big Data., , and . IEEE Access, (2018)PiDicators: An Efficient Artifact to Detect Various VMs., , , , and . ICICS, volume 12282 of Lecture Notes in Computer Science, page 259-275. Springer, (2020)