Author of the publication

Mixed graph convolution and residual transformation network for skeleton-based action recognition.

, , , , and . Appl. Intell., 52 (2): 1544-1555 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experiments on image texture classification with K-views classifier, Markov random fields and cooccurrence probabilities., , , and . IGARSS, page 3818-3821. IEEE, (2004)A target-oriented segmentation method for specific tissues in MRI images of the brain., , , , , and . Multim. Tools Appl., 78 (7): 9083-9099 (2019)A multimodal fusion model with multi-level attention mechanism for depression detection., , , , and . Biomed. Signal Process. Control., (April 2023)An Unpaired Cross-Modality Segmentation Framework Using Data Augmentation and Hybrid Convolutional Networks for Segmenting Vestibular Schwannoma and Cochlea., , , , and . BrainLes@MICCAI (2), volume 14092 of Lecture Notes in Computer Science, page 79-89. Springer, (2022)Using Ant Colony Optimization and Self-organizing Map for Image Segmentation., and . MICAI, volume 4827 of Lecture Notes in Computer Science, page 570-579. Springer, (2007)The Handicap Principle for Trust in Computer Security, the Semantic Web and Social Networking., , and . WISM, volume 5854 of Lecture Notes in Computer Science, page 458-468. Springer, (2009)Image Segmentation Using Dynamic Run-Length Coding Technique., and . SCIA, volume 2749 of Lecture Notes in Computer Science, page 343-348. Springer, (2003)Hybridization of the Ant Colony Optimization with the K-Means Algorithm for Clustering., and . SCIA, volume 3540 of Lecture Notes in Computer Science, page 511-520. Springer, (2005)Performance consequences of introducing an internal penalty function to a genetic algorithm for scheduling., and . RACS, page 12-15. ACM, (2013)The investigation of the structural properties of machines for the design of secure and trustworthy systems., , , and . RACS, page 261-265. ACM, (2011)