Search for persons
X
?
Lecture Notes in Computer Science; Innovative Technologies and Learning ,
1
A Study of Virtual Skills Training on Students' Perceptions..:
, In:
?
2023 16th UK-Europe-China Workshop on Millimetre Waves and Terahertz Technologies (UCMMT) ,
2
A Compact Wideband Meander-Line Based Dipole Antenna for Sa..:
, In:
?
Lecture Notes in Civil Engineering; Proceedings of the 9th International Conference on Civil Engineering ,
3
Study on Ground Deformation Law of Small Spacing Shield Tun..:
, In:
?
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) ,
4
Semi-Supervised Hyperspectral Object Detection Challenge Re..:
, In:
?
The International Conference on Evaluation and Assessment in Software Engineering 2022 ,
5
Performance Modeling of Hyperledger Fabric 2.0:
, In:
?
Lecture Notes in Computer Science; Computer Vision – ECCV 2022 ,
7
UC-OWOD: Unknown-Classified Open World Object Detection:
, In:
?
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) ,
8
Pseudo-label Generation and Various Data Augmentation for S..:
, In:
?
2022 3rd International Conference on Education, Knowledge and Information Management (ICEKIM) ,
9
Research on the relationship between adolescent psychologic..:
, In:
?
Application of Intelligent Systems in Multi-modal Information Analytics; Advances in Intelligent Systems and Computing ,
10
Parameter Identification of J-A Model Based on Improved Alg..:
, In:
?
Computer Vision – ECCV 2020 Workshops; Lecture Notes in Computer Science ,
11
AIM 2020 Challenge on Image Extreme Inpainting:
, In:
?
Computer Vision – ECCV 2020 Workshops; Lecture Notes in Computer Science ,
12
AIM 2020 Challenge on Real Image Super-Resolution: Methods ..:
, In:
?
2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW) ,
13
Augmentation Invariant Training:
, In:
?
Companion Proceedings of The 2019 World Wide Web Conference ,
14
User Donations in a User Generated Video System:
, In:
?
Lecture Notes in Computer Science; Artificial Intelligence and Security ,
15