Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intracranial hemorrhage detection by 3D voxel segmentation on brain CT images., , , , and . WCSP, page 1-5. IEEE, (2015)A PSC-Based Approach to Monitor the Timed Properties in Web Service Compositions., , , and . COMPSAC, page 112-115. IEEE Computer Society, (2008)Reliability Does Matter: An End-to-End Weakly Supervised Semantic Segmentation Approach., , , , and . CoRR, (2019)Progressive Sample Mining and Representation Learning for One-Shot Person Re-identification with Adversarial Samples., , , , and . CoRR, (2019)Adaptive foveated single-pixel imaging with dynamic super-sampling., , , , , , and . CoRR, (2016)Data Poisoning Attack against Unsupervised Node Embedding Methods., , , , , , and . CoRR, (2018)Monitoring Web Services for Conformance., , , , and . SOSE, page 92-102. IEEE Computer Society, (2013)Data-Enriched Modeling and Verification of WS-CDL Based on UML Models., , , , and . ICWS, page 752-753. IEEE Computer Society, (2008)Extending PSC for Monitoring the Timed Properties in Composite Services., , , and . APSEC, page 335-342. IEEE Computer Society, (2008)Rethinking the Value of Network Pruning., , , , and . ICLR (Poster), OpenReview.net, (2019)