Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Access and monitor vulnerability of urban metro network system in China., , , , , and . SoSE, page 143-148. IEEE, (2012)A detection method for low-pixel ratio object., , , , , , , and . Multimedia Tools Appl., 78 (9): 11655-11674 (2019)A Strong Feature Representation for Siamese Network Tracker., , and . CoRR, (2019)An Approach for Understanding and Promoting Coal Mine Safety by Exploring Coal Mine Risk Network., , , and . Complexity, (2017)Geometry Sharing Network for 3D Point Cloud Classification and Segmentation., , and . CoRR, (2019)An Efficient Training Approach for Very Large Scale Face Recognition., , , , , , , and . CoRR, (2021)CP-Net: Contour-Perturbed Reconstruction Network for Self-Supervised Point Cloud Learning., , , , and . CoRR, (2022)Research on Inversion Algorithm of the Power Transmission Corridor Information Based on Radar Ranging., , , , , and . IJCNN, page 1-7. IEEE, (2021)Computational Fluid Dynamics Analysis of the Air Damping for an Electromechanical Converter., , , , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 907-914. Springer, (2015)Wi-Adaptor: Fine-grained Domain Adaptation in WiFi-based Activity Recognition., , and . GLOBECOM, page 1-6. IEEE, (2021)