Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Person re-identification with content and context re-ranking., , , , and . Multimedia Tools Appl., 74 (17): 6989-7014 (2015)Failure Detection Framework for Stochastic Discrete Event Systems With Guaranteed Error Bounds., and . IEEE Trans. Automat. Contr., 60 (6): 1542-1553 (2015)A novel radar radiation control strategy based on passive tracking in multiple aircraft platforms., , , and . ChinaSIP, page 777-780. IEEE, (2014)Benefit-Cost Analysis of Security Systems for Multiple Protected Assets Based on Information Entropy., , , and . Entropy, 14 (3): 571-580 (2012)Out-of-Stock Detection Based on Deep Learning., , and . ICIC (1), volume 11643 of Lecture Notes in Computer Science, page 228-237. Springer, (2019)The GluN2B subunit represents a major functional determinant of NMDA receptors in human induced pluripotent stem cell-derived cortical neurons, , , , , , , , , and . Stem Cell Research, (2018)A Secchi Depth Algorithm Considering the Residual Error in Satellite Remote Sensing Reflectance Data., , , and . Remote Sensing, 11 (16): 1948 (2019)Deep Feature Representation via Multiple Stack Auto-Encoders., , , , , , and . PCM (1), volume 9314 of Lecture Notes in Computer Science, page 275-284. Springer, (2015)Interpretable fuzzy modeling using multi-objective immune-inspired optimization algorithms., and . FUZZ-IEEE, page 1-8. IEEE, (2010)An End-to-End Demonstration for 5G Network Slicing., , , , , , , and . VTC Spring, page 1-5. IEEE, (2019)