Author of the publication

A highly effective error concealment method for whole frame loss.

, , , and . ISCAS, page 2135-2138. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two Effective Algorithms for Color Image Denoising., , and . ICVS, volume 10528 of Lecture Notes in Computer Science, page 207-217. Springer, (2017)Structure Destruction and Content Combination for Face Anti-Spoofing., , , , , , and . IJCB, page 1-6. IEEE, (2021)Recover The Residual Of Residual: Recurrent Residual Refinement Network For Image Super-Resolution., , , , , and . ICIP, page 1804-1808. IEEE, (2021)Quantum cloning attacks against PUF-based quantum authentication systems., , , and . Quantum Inf. Process., 15 (8): 3311-3325 (2016)Super Resolve Dynamic Scene from Continuous Spike Streams., , , , , and . ICCV, page 2513-2522. IEEE, (2021)Understanding and optimizing the statistical performance of machine learning models under memory budgets.. Stanford University, USA, (2019)3D Model Reconstruction from Turntable Sequence with Multiple -View Triangulation., , , and . ISVC (2), volume 5876 of Lecture Notes in Computer Science, page 470-479. Springer, (2009)Experiments in Medical Translation Shared Task at WMT 2014.. WMT@ACL, page 260-265. The Association for Computer Linguistics, (2014)Optimal Jamming Strategy Against Periodically Switched Linear Discrete-Time System., , , , and . ASCC, page 2001-2006. IEEE, (2022)Automatic Sheep Counting by Multi-object Tracking., , , and . VCIP, page 257. IEEE, (2020)