Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Broadband Analog Network Coding with Multiple Relays., , and . CMC, page 299-302. IEEE Computer Society, (2011)Hierarchical Skull Registration Method with a Bounded Rotation Angle., , , , and . ICIC (3), volume 10363 of Lecture Notes in Computer Science, page 563-573. Springer, (2017)Skull Gender Identification Based on Skull Contour and Convolutional Neural Network., , , , , and . BIBM, page 2269-2273. IEEE Computer Society, (2018)Study and Improvement of the Resource Allocation Algorithm in TWDM-PON Based on the Correlation of Switching Periods., , , , , and . CSPS, volume 463 of Lecture Notes in Electrical Engineering, page 1474-1481. Springer, (2017)Similarity Measurement Between Reconstructed 3D Face and 2D Face Based on Deep Learning., , , , and . CCBR, volume 11818 of Lecture Notes in Computer Science, page 250-257. Springer, (2019)EXPSOL: Recommending Online Threads for Exception-Related Bug Reports., , , and . APSEC, page 25-32. IEEE Computer Society, (2016)3D Face Recognition Based on Geometrical Measurement., , and . SINOBIOMETRICS, volume 3338 of Lecture Notes in Computer Science, page 244-249. Springer, (2004)FAD-Net: Fake Images Detection and Generalization Based on Frequency Domain Transformation., , , , , and . CISP-BMEI, page 1-7. IEEE, (2022)PASTA: Towards Flexible and Efficient HDR Imaging Via Progressively Aggregated Spatio-Temporal Aligment., , , , , , , and . CoRR, (2024)MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning., , , , , , , and . CoRR, (2022)