Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security Protocol for Wireless Sensor Networks., , , and . WSAN, volume 264 of IFIP, page 113-124. Springer, (2008)Technology research of ultra-tightly integration about INS aided tracking loop based on EKF., , and . ICIIP, page 32. ACM, (2016)Predicting Eye Fixations on Webpage With an Ensemble of Early Features and High-Level Representations from Deep Network., , and . IEEE Trans. Multim., 17 (11): 2084-2093 (2015)StarCraft adversary-agent challenge for pursuit-evasion game.. J. Frankl. Inst., 360 (15): 10893-10916 (October 2023)eDiff-I: Text-to-Image Diffusion Models with an Ensemble of Expert Denoisers., , , , , , , , , and 2 other author(s). CoRR, (2022)Magic3D: High-Resolution Text-to-3D Content Creation., , , , , , , , , and . CoRR, (2022)Generative Adversarial Networks for Image and Video Synthesis: Algorithms and Applications., , , , and . Proc. IEEE, 109 (5): 839-862 (2021)Top-Down Learning for Structured Labeling with Convolutional Pseudoprior., , and . ECCV (4), volume 9908 of Lecture Notes in Computer Science, page 302-317. Springer, (2016)Controllable Video Generation With Sparse Trajectories., , and . CVPR, page 7854-7863. Computer Vision Foundation / IEEE Computer Society, (2018)A controllable canonical form implementation of time domain impedance boundary conditions for broadband aeroacoustic computation., , and . J. Comput. Phys., (2016)