Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient and Scene-Adaptive Algorithm for Vehicle Detection in Aerial Images Using an Improved YOLOv3 Framework., and . ISPRS Int. J. Geo-Information, 8 (11): 483 (2019)An Auto-adaptation Method for Dynamically Reconfigurable System-on-Chip., , and . ISVLSI, page 499-502. IEEE Computer Society, (2008)Distributed Voltage Security Monitoring in Large Power Systems Using Synchrophasors., , and . IEEE Trans. Smart Grid, 7 (2): 982-991 (2016)Cartoonish sketch-based face editing in videos using identity deformation transfer., , , , , , and . Computers & Graphics, (2019)Comprehensive Reputation-Based Security Mechanism against Dynamic SSDF Attack in Cognitive Radio Networks., , and . Symmetry, 8 (12): 147 (2016)The Covert Helps Parse the Overt., , and . CoNLL, page 343-353. Association for Computational Linguistics, (2017)A Polar Initial Alignment Algorithm for Unmanned Underwater Vehicles., , , , , and . Sensors, 17 (12): 2709 (2017)Macro finance early warning system., , , and . Frontiers of Computer Science in China, 3 (2): 226-234 (2009)A New Approach to Forecasting Container Throughput of Guangzhou Port with Domain Knowledge., , and . IJKSS, 4 (3): 70-88 (2013)A hybrid power line and visible light communication system for indoor hospital applications., , , , , , and . Computers in Industry, (2015)