Author of the publication

Optimized weighted decoding for error-correcting output codes.

, , , and . ICASSP, page 2101-2104. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Augmented Broadcaster Identity-based Broadcast Encryption., , and . JDIM, 11 (3): 227-234 (2013)CookieMiner: Towards real-time reconstruction of web-downloading chains from network traces., , , and . ICC, page 1-6. IEEE, (2016)A Model-Driven Approach for 3D Modeling of Pylon from Airborne LiDAR Data., , and . Remote Sensing, 7 (9): 11501-11524 (2015)Improving the Probabilistic Framework for Representing Dialogue Systems with User Response Model., , and . INTERSPEECH, page 2701-2705. ISCA, (2016)The Study of Cross Networks Alarm Correlation Based on Big Data Technology., , , , , and . HCC, volume 9567 of Lecture Notes in Computer Science, page 739-745. Springer, (2016)Dataset for the First Evaluation on Chinese Machine Reading Comprehension., , , , , and . LREC, European Language Resources Association (ELRA), (2018)A gradient-based pixel-domain attack against SVM detection of global image manipulations., , , , , and . WIFS, page 1-6. IEEE, (2017)Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder., , and . WIFS, page 1-6. IEEE, (2016)A Span-Extraction Dataset for Chinese Machine Reading Comprehension., , , , , , , and . CoRR, (2018)Convolutional Spatial Attention Model for Reading Comprehension with Multiple-Choice Questions., , , , and . CoRR, (2018)