Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Di XieHikvision Research InstituteVerified email at hikvision.com
Shiliang PuHikvision Research InsitituteVerified email at hikvision.com
Yueting ZhuangProfessor of Computer Science, Zhejiang UniversityVerified email at zju.edu.cn
Luojun LinFuzhou UniversityVerified email at fzu.edu.cn
Qiaoyong ZhongHikvision Research InstituteVerified email at hikvision.com
Chao LiVerified email at mail.nwpu.edu.cn
George BebisFoundation Professor, Dept of Computer Science and Engineering, University of Nevada RenoVerified email at cse.unr.edu
Yilu GuoHikvision Research InstituteVerified email at hikvision.com
Muhammad HussainProfessor, Department of Computer Science, King Saud UniversityVerified email at ksu.edu.sa
Ghulam MuhammadProfessor at King Saud UniversityVerified email at ksu.edu.sa
Anwar M. MirzaMcMaster UniversityVerified email at mcmaster.ca
Wenqi RenUniversity of Science and Technology of China; Hikvision Research InstituteVerified email at mail.ustc.edu.cn
Weijie ChenHikvision Research Institute