Get my own profile
Public access
View all8 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Di XieHikvision Research InstituteVerified email at hikvision.com
Shiliang PuHikvision Research InsitituteVerified email at hikvision.com
Yueting ZhuangProfessor of Computer Science, Zhejiang UniversityVerified email at zju.edu.cn
Luojun LinFuzhou UniversityVerified email at fzu.edu.cn
Jie Song (宋杰)Associate Professor, Zhejiang UniversityVerified email at zju.edu.cn
Song, MingliFull Professor of Computer Science, Zhejiang UniversityVerified email at zju.edu.cn
yunyi xuanHikvision Research InstituteVerified email at hikvision.com
Xinchao WangNational University of SingaporeVerified email at nus.edu.sg
Lei ZhangProfessor, Chongqing University 重庆大学Verified email at cqu.edu.cn
Rang MengZhejiang University; Hikvision Research InstituteVerified email at zju.edu.cn
Qiaoyong ZhongHikvision Research InstituteVerified email at hikvision.com
Junyu GaoInstitute of Automation, Chinese Academy of Sciences (CASIA)Verified email at nlpr.ia.ac.cn
George BebisFoundation Professor, Dept of Computer Science and Engineering, University of Nevada RenoVerified email at cse.unr.edu
Long ZhaoHikvision Research Institute, ChinaVerified email at hikvision.com
Yilu GuoHikvision Research InstituteVerified email at hikvision.com
Muhammad HussainProfessor, Department of Computer Science, King Saud UniversityVerified email at ksu.edu.sa
Ghulam MuhammadProfessor at King Saud UniversityVerified email at ksu.edu.sa
Anwar M. MirzaMcMaster UniversityVerified email at mcmaster.ca
Chao LiAlibaba GroupVerified email at mail.nwpu.edu.cn
Wenqi RenHikvision Research Institute & University of Science and Technology of ChinaVerified email at mail.ustc.edu.cn