Search for persons
X
?
2024 IEEE International Conference on Consumer Electronics (ICCE) ,
1
Traditional Transformation Theory Guided Model for Learned ..:
, In:
?
2023 IEEE International Conference on Visual Communications and Image Processing (VCIP) ,
2
Under-Display ToF Imaging with Efficient Transformer:
, In:
?
2023 IEEE International Conference on Visual Communications and Image Processing (VCIP) ,
3
Non-uniform Deblurring by Deep Sharpness Edge Guided Model:
, In:
?
2022 China Automation Congress (CAC) ,
4
Design Compact YOLO based Network for Small Target Detectio..:
, In:
?
2022 China Automation Congress (CAC) ,
5
An Efficient Siamese Network for Pet Identity Verification:
, In:
?
2022 IEEE International Conference on Consumer Electronics (ICCE) ,
6
Multi-stream Face Anti-spoofing System Using 3D Information:
, In:
?
Lecture Notes in Computer Science; Medical Image Computing and Computer Assisted Intervention – MICCAI 2022 ,
7
Multi-institutional Investigation of Model Generalizability..:
, In:
?
Proceedings of the 31st ACM International Conference on Information & Knowledge Management ,
8
Target Interest Distillation for Multi-Interest Recommendat..:
, In:
?
2020 IEEE Symposium on Computers and Communications (ISCC) ,
9
Flush-Detector: More Secure API Resistant to Flush-Based Sp..:
, In:
?
Information and Communications Security; Lecture Notes in Computer Science ,
10
SecFlush: A Hardware/Software Collaborative Design for Real..:
, In:
?
2020 IEEE Symposium on Computers and Communications (ISCC) ,
11
A Hardware/Software Collaborative SM4 Implementation Resist..:
, In:
?
2019 IEEE 37th International Conference on Computer Design (ICCD) ,
12
AdapTimer: Hardware/Software Collaborative Timer Resistant ..:
, In:
?
Advances in Knowledge Discovery and Data Mining; Lecture Notes in Computer Science ,
13
Knowledge Graph Embedding with Order Information of Triplet:
, In:
?
2019 26th Asia-Pacific Software Engineering Conference (APSEC) ,
14
More Secure Collaborative APIs Resistant to Flush+Reload an..:
, In:
?
Computer Security; Lecture Notes in Computer Science ,
15