Author of the publication

A fast and robust 3D face recognition approach based on deeply learned face representation.

, , , , and . Neurocomputing, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Analysis and Optimization of KNN Algorithm Space-Time Efficiency for Chinese Text Categorization., and . CSEE (1), volume 214 of Communications in Computer and Information Science, page 542-550. Springer, (2011)Caching collaboration and cache allocation in peer-to-peer video systems, , and . Multimedia Tools Appl., 37 (2): 117--134 (2008)Policy to cope with deadlocks and livelocks for flexible manufacturing systems using the max′-controlled new smart siphons, , , , , , and . Control Theory & Applications, IET, 8 (16): 1607--1616 (2014)Face attribute prediction with convolutional neural networks., , , , and . ROBIO, page 1294-1299. IEEE, (2017)Scenario Driven Lifecycle Automation of Net-Centric Simulation., , , , and . AsiaSim (2), volume 324 of Communications in Computer and Information Science, page 413-420. Springer, (2012)Spatio-Temporal Check-in Time Prediction with Recurrent Neural Network based Survival Analysis., , and . IJCAI, page 2976-2983. ijcai.org, (2018)Full Location Privacy Protection Through Restricted Space Cloaking., and . J. Inf. Process., (2017)Feeling-based location privacy protection for location-based services., and . ACM Conference on Computer and Communications Security, page 348-357. ACM, (2009)A Reputation-based Trust Management in Peer-to-Peer Network Systems., , , and . PDCS, page 510-515. ISCA, (2004)A Survey on Service Migration Strategies for Vehicular Edge Computing., , and . ICBDS, volume 1563 of Communications in Computer and Information Science, page 473-487. Springer, (2021)