Author of the publication

Attention Aware Deep Learning Object Detection and Simulation.

, , , and . SimuTools (2), volume 370 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 1-14. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sensorless Control Strategy of Permanent Magnet Synchronous Motor Based on Fuzzy Sliding Mode Observer., , and . IEEE Access, (2022)Execution Delay Optimization-based Cooperative Task Process in Cellular MEC Systems., , and . VTC Fall, page 1-5. IEEE, (2021)A new associative classifier for text categorization., , , and . ISKE, page 291-295. IEEE, (2008)Web Text Clustering for Personalized E-learning Based on Maximal Frequent Itemsets., , , and . CSSE (6), page 452-455. IEEE Computer Society, (2008)978-0-7695-3336-0.Multi-network Communication Gateway of IoT for Complex Environment., , and . IoTaaS, volume 271 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 120-126. Springer, (2018)Attention Aware Deep Learning Object Detection and Simulation., , , and . SimuTools (2), volume 370 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 1-14. Springer, (2020)CSARUNet: an attention mechanism-based model for image tampering localization with ringed residual block., , and . IJCNN, page 1-8. IEEE, (2023)Diagnosis System of the Anode Faults for Alumina Reduction Cell., and . ISDA (1), page 844-849. IEEE Computer Society, (2006)Enhancing LSM-Tree Key-Value Stores for Read-Modify-Writes via Key-Delta Separation., , , and . ICDE, page 4938-4950. IEEE, (2024)MemCloak: Practical Access Obfuscation for Untrusted Memory., , , , and . ACSAC, page 187-197. ACM, (2018)