Author of the publication

The Devil is in the Middle: Exploiting Mid-level Representations for Cross-Domain Instance Matching.

, , , , and . CoRR, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Degradation of the In-plane Shear Modulus of Structural BFRP Laminates Due to High Temperature., , , , and . Sensors, 18 (10): 3361 (2018)Blind Multiuser Detection for Long Code Multipath DS-CDMA Systems with Bayesian MC Techniques., , and . Wireless Personal Communications, 39 (3): 265-278 (2006)Some Hesitant Fuzzy Einstein Aggregation Operators and Their Application to Multiple Attribute Group Decision Making., , , and . Int. J. Intell. Syst., 31 (7): 722-746 (2016)Bayesian Trees for Automated Cytometry Data Analysis., , , , and . MLHC, volume 85 of Proceedings of Machine Learning Research, page 465-483. PMLR, (2018)Human mobility discovering and movement intention detection with GPS trajectories., , , and . Decis. Support Syst., (2014)Evolution of cooperation on independent networks: The influence of asymmetric information sharing updating mechanism., , , , and . Appl. Math. Comput., (2019)Regulation of self-sustained target waves in excitable small-world networks.. Commun. Nonlinear Sci. Numer. Simul., 27 (Issues): 12-21 (2015)Effects of time delay and connection probability on self-sustained oscillations and synchronization transitions in excitable Erdös-Rényi random networks., and . Commun. Nonlinear Sci. Numer. Simul., (2017)The Exact Rate-Memory Tradeoff for Caching With Uncoded Prefetching., , and . IEEE Trans. Inf. Theory, 64 (2): 1281-1296 (2018)Lagrange Coded Computing: Optimal Design for Resiliency, Security and Privacy., , , and . CoRR, (2018)