Get my own profile
Public access
View all8 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Di XieHikvision Research InstituteVerified email at hikvision.com
- Shiliang PuHikvision Research InsitituteVerified email at hikvision.com
- Yueting ZhuangProfessor of Computer Science, Zhejiang UniversityVerified email at zju.edu.cn
- Luojun LinFuzhou UniversityVerified email at fzu.edu.cn
- Jie Song (宋杰)Associate Professor, Zhejiang UniversityVerified email at zju.edu.cn
- Song, MingliFull Professor of Computer Science, Zhejiang UniversityVerified email at zju.edu.cn
- yunyi xuanHikvision Research InstituteVerified email at hikvision.com
- Xinchao WangNational University of SingaporeVerified email at nus.edu.sg
- Rang MengZhejiang University; Hikvision Research InstituteVerified email at zju.edu.cn
- Lei ZhangProfessor, Chongqing University 重庆大学Verified email at cqu.edu.cn
- Qiaoyong ZhongHikvision Research InstituteVerified email at hikvision.com
- Junyu GaoInstitute of Automation, Chinese Academy of Sciences (CASIA)Verified email at nlpr.ia.ac.cn
- George BebisFoundation Professor, Dept of Computer Science and Engineering, University of Nevada RenoVerified email at cse.unr.edu
- Long ZhaoHikvision Research Institute, ChinaVerified email at hikvision.com
- Yilu GuoHikvision Research InstituteVerified email at hikvision.com
- Muhammad HussainProfessor, Department of Computer Science, King Saud UniversityVerified email at ksu.edu.sa
- Ghulam MuhammadProfessor at King Saud UniversityVerified email at ksu.edu.sa
- Anwar M. MirzaMcMaster UniversityVerified email at mcmaster.ca
- Chao LiAlibaba GroupVerified email at mail.nwpu.edu.cn
- Wenqi RenHikvision Research Institute & University of Science and Technology of ChinaVerified email at mail.ustc.edu.cn