Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chip Multithreaded Consistency Model., , , and . J. Comput. Sci. Technol., 23 (2): 298-305 (2008)Compression artifact removal using multi-scale reshuffling convolutional network., and . CVPR Workshops, page 2567-2570. Computer Vision Foundation / IEEE Computer Society, (2018)Alleviating Imbalance in Synchronous Distributed Training of Deep Neural Networks., , , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 405-412. IEEE, (2021)Optimizing the Efficiency of Data Transfer in Dataflow Architectures., , , , , , and . HPCC/SmartCity/DSS, page 140-149. IEEE, (2018)GPLDet: A Strong Anchor-free Object Detector for Gastric Precancerous Lesions., , , , , and . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, page 266-274. IEEE, (2022)Pixel-Semantic Revising of Position: One-Stage Object Detector with Shared Encoder-Decoder., , , , and . ICONIP (4), volume 1332 of Communications in Computer and Information Science, page 516-525. Springer, (2020)Reducing System Overheads in Home-based Software DSMs., , and . IPPS/SPDP, page 167-173. IEEE Computer Society, (1999)Semantic attention-based heterogeneous feature aggregation network for image fusion., , , , and . Pattern Recognit., (2024)LeakageFreeSpec: Applying the Wiping Approach to Defend Against Transient Execution Attacks., , , and . CF, ACM, (2024)Every Time Can Be Different: A Data Dynamic Protection Method Based on Moving Target Defense., , , , , and . ISCC, page 568-574. IEEE, (2023)