Get my own profile
Public access
View all16 articles
13 articles
available
not available
Based on funding mandates
Co-authors
Peng WangSchool of Computer Science, Northwestern Polytechnical University, ChinaVerified email at nwpu.edu.cn
Yihong GongXi'an Jiaotong UniversityVerified email at mail.xjtu.edu.cn
Guoqiang LiangNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
Bingliang JiaoNorthwestern Polytechnical University PHDVerified email at mail.nwpu.edu.cn
De ChengAssociate Professor, Xidian UniversityVerified email at xidian.edu.cn
Lingyan RanNWPUVerified email at nwpu.edu.cn
Yong XiaNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
Jinjun WangXian Jiaotong University, ChinaVerified email at ieee.org
Xing Wei (魏星)Xi'an Jiaotong UniversityVerified email at xjtu.edu.cn
Lu YangNorthwestern Polytechnical UniversityVerified email at mail.nwpu.edu.cn
Xiaoyu TaoPh.D Student at Xi'an Jiaotong UniversityVerified email at stu.xjtu.edu.cn
Congqi CaoSchool of Computer Science, Northwestern Polytechnical UniversityVerified email at nwpu.edu.cn
Weiwei ShiXi'an University of TechnologyVerified email at xaut.edu.cn
Yudong Liangthe School of Computer and Information Technology, Shanxi UniversityVerified email at sxu.edu.cn
Dahu ShiHikvision Research InsitituteVerified email at hikvision.com
Qiqi HouQualcomm AI ResearchVerified email at pdx.edu