From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Person Re-identification based on nonlinear ranking with difference vectors., , , , , и . Inf. Sci., (2014)An Improved Selective Encryption for H.264 Video based on Intra Prediction Mode Scrambling., , , , и . J. Multim., 5 (5): 464-472 (2010)Are we really making much progress?: Revisiting, benchmarking and refining heterogeneous graph neural networks., , , , , , , , , и . KDD, стр. 1150-1160. ACM, (2021)CIDetector: Semi-Supervised Method for Multi-Topic Confidential Information Detection., , , , , , и . ECAI, том 325 из Frontiers in Artificial Intelligence and Applications, стр. 1834-1841. IOS Press, (2020)Saliency and Granularity: Discovering Temporal Coherence for Video-Based Person Re-Identification., , , , , и . IEEE Trans. Circuits Syst. Video Technol., 32 (9): 6100-6112 (2022)Global-Local Graph Convolutional Network for cross-modality person re-identification., , , , , и . Neurocomputing, (2021)HeterSupervise: Package-level Android Malware Analysis Based on Heterogeneous Graph., , , , , , и . HPCC/DSS/SmartCity, стр. 328-335. IEEE, (2020)Energy Efficient Data Transmission Mechanism in Wireless Sensor Networks., , , , и . ISCSCT (1), стр. 216-219. IEEE Computer Society, (2008)A Visualization Scheme for Network Forensics Based on Attribute Oriented Induction Based Frequent Item Mining and Hyper Graph., , , , , и . ICDF2C, том 216 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 130-143. Springer, (2017)Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation., , , , , , , и . MILCOM, стр. 1-6. IEEE, (2019)