Author of the publication

Iterative Discriminative Domain Adaptation.

, , , and . PRCV (1), volume 11857 of Lecture Notes in Computer Science, page 349-360. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Rational Threshold Signature Model and Protocol Based on Different Permissions., , and . J. Applied Mathematics, (2014)Managing Information Uncertainty in Wave Height Modeling for the Offshore Structural Analysis through Random Set., , , , , , , and . Complexity, (2017)Image Classification by Hierarchical Spatial Pooling with Partial Least Squares Analysis., , , , , and . BMVC, page 1-11. BMVA Press, (2012)Power Spectral Analysis of Acupoint Bioelectricity., , , , , , , and . GreenCom/iThings/CPScom, page 1844-1847. IEEE, (2013)Pruning redundant synthesis units based on static and delta unit appearance frequency., , , , , , and . INTERSPEECH, page 269-273. ISCA, (2015)Feature-Cost Sensitive Learning with Submodular Trees of Classifiers., , , , , and . AAAI, page 1939-1945. AAAI Press, (2014)Implementation of Gray Projection Image Stabilization Algorithm Based on TMS320DM642., , , , and . NCM, page 1724-1726. IEEE Computer Society, (2009)Robust Reversible Data Hiding for Multispectral Images., , and . JNW, 9 (6): 1454-1463 (2014)Wrinkling Captured Garments Using Space-Time Data-Driven Deformation., , , , , , and . Comput. Graph. Forum, 28 (2): 427-435 (2009)STSHC: secure and trusted scheme for Hadoop cluster., , , and . IJHPSA, 5 (1): 63-69 (2014)