Crea il mio profilo
Accesso pubblico
Visualizza tutto22 articoli
4 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Edwin HancockEmeritus Professor, Department of Computer Science, University of York, UKEmail verificata su cs.york.ac.uk
- Jun ZhouSchool of Information and Communication Technology, Griffith UniversityEmail verificata su griffith.edu.au
- Cong Phuoc HuynhSenior Applied Scientist at Amazon Prime VideoEmail verificata su amazon.com
- Zhouyu FuLead Researcher, Microsoft Research AsiaEmail verificata su microsoft.com
- Lin GuResearch Scientist, RIKEN AIP, University of TokyoEmail verificata su mi.t.u-tokyo.ac.jp
- Andrea TORSELLOProfessor of Computer Science, Università Ca' Foscari VeneziaEmail verificata su unive.it
- YOU ShaodiAssistant Professor, University of AmsterdamEmail verificata su uva.nl
- Yuntao QianProfessor of Computer Science, Zhejiang UniversityEmail verificata su zju.edu.cn
- Sen JiaShenzhen universityEmail verificata su szu.edu.cn
- Ran WeiDATA61/CSIROEmail verificata su csiro.au
- Terry CaelliDeakin UniversityEmail verificata su deakin.edu.au
- Mengmeng GeUniversity of CanterburyEmail verificata su canterbury.ac.nz
- Zubair BaigAssociate Professor, Cyber-Security, Deakin University, Melbourne, AustraliaEmail verificata su deakin.edu.au
- Mark PickeringUNSW CanberraEmail verificata su adfa.edu.au
- Richard C WilsonDepartment of Computer Science, University of YorkEmail verificata su york.ac.uk
- Junxuan LiMetaEmail verificata su meta.com
- Bin LuoAnhui University, University of YorkEmail verificata su ahu.edu.cn
- Sejuti RahmanUniversity of DhakaEmail verificata su du.ac.bd
- Xiuping JiaUniversity of New South WalesEmail verificata su adfa.edu.au
- Hongdong LiProfessor of Computer Vision and Learning, Australian National UniversityEmail verificata su anu.edu.au
Segui
Antonio Robles-Kelly
School of Information Technology, Deakin University
Email verificata su deakin.edu.au - Home page