Author of the publication

Rule-Embedded Network for Audio-Visual Voice Activity Detection in Live Musical Video Streams.

, , , , and . ICASSP, page 4165-4169. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-scale temporospatial variability of the East Asian Meiyu-Baiu fronts: characterization with a suite of new objective indices, , , and . (2017)From Computing to Informatics.. DMS, Knowledge Systems Institute, (2010)Structured Sparse Linear Model for Social Trust Prediction., , , and . WAIM, volume 8485 of Lecture Notes in Computer Science, page 756-767. Springer, (2014)Design of Cyber Security for Critical Infrastructures: A Case for a Schizoid Design Approach., , and . SPACE, volume 9354 of Lecture Notes in Computer Science, page 41-54. Springer, (2015)Magic Adversaries Versus Individual Reduction: Science Wins Either Way.. EUROCRYPT (2), volume 10211 of Lecture Notes in Computer Science, page 351-377. (2017)A HyperNet Model for Large Hypertext Systems., and . DASFAA, volume 2 of Advanced Database Research and Development Series, page 484-490. World Scientific, (1991)A Self-Configuring Communication Virtual Machine., , and . ICNSC, page 739-744. IEEE, (2008)Temporal Logic Inference for Hybrid System Observation with Spatial and Temporal Uncertainties., , and . CoRR, (2020)Non-Malleable Functions and Their Applications., , , , and . Public Key Cryptography (2), volume 9615 of Lecture Notes in Computer Science, page 386-416. Springer, (2016)Safe Neighborhood Computation for Hybrid System Verification., and . HAS, volume 174 of EPTCS, page 1-12. (2014)