Get my own profile
Public access
View all19 articles
13 articles
available
not available
Based on funding mandates
Co-authors
- Yihong GongXi'an Jiaotong UniversityVerified email at mail.xjtu.edu.cn
- Peng WangSchool of Computer Science, Northwestern Polytechnical University, ChinaVerified email at nwpu.edu.cn
- Guoqiang LiangNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
- De ChengAssociate Professor, Xidian UniversityVerified email at xidian.edu.cn
- Lingyan RanNWPUVerified email at nwpu.edu.cn
- Bingliang JiaoNorthwestern Polytechnical University PHDVerified email at mail.nwpu.edu.cn
- Yong XiaNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
- Jinjun WangXian Jiaotong University, ChinaVerified email at ieee.org
- Xing Wei (魏星)Xi'an Jiaotong UniversityVerified email at xjtu.edu.cn
- Lu YangNorthwestern Polytechnical UniversityVerified email at mail.nwpu.edu.cn
- Xiaoyu TaoPh.D Student at Xi'an Jiaotong UniversityVerified email at stu.xjtu.edu.cn
- Congqi CaoSchool of Computer Science, Northwestern Polytechnical UniversityVerified email at nwpu.edu.cn
- Weiwei ShiXi'an University of TechnologyVerified email at xaut.edu.cn
- Yudong Liangthe School of Computer and Information Technology, Shanxi UniversityVerified email at sxu.edu.cn
- Dahu ShiHikvision Research InsitituteVerified email at hikvision.com
- Qiqi HouQualcomm AI ResearchVerified email at pdx.edu