Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique., , , and . Digital Signal Processing, (2015)A graph approach to quantitative analysis of control-flow obfuscating transformations., , and . IEEE Trans. Information Forensics and Security, 4 (2): 257-267 (2009)A Noncontact Skin Oxygen-Saturation Imaging System for Measuring Human Tissue Oxygen Saturation., , , , and . IEEE Trans. Instrumentation and Measurement, 63 (11): 2620-2631 (2014)Wearable Inverse Light-Emitting Diode Sensor for Measuring Light Intensity at Specific Wavelengths in Light Therapy., , , , , , , , and . IEEE Trans. Instrumentation and Measurement, 68 (5): 1561-1574 (2019)Evaluation of blood pressure by analyzing the fluctuation frequency of oxygen saturation in palmar digital vein., , , and . I2MTC, page 1-5. IEEE, (2017)A study on oxygen saturation images constructed from the skin tissue of human hand., , , and . I2MTC, page 58-62. IEEE, (2013)Integrating temperature, humidity, and optical aerosol sensors for a wireless module for three-dimensional space monitoring., , , , , , , , and . SAS, page 1-4. IEEE, (2018)Threat as a Service?: Virtualization's Impact on Cloud Security., , , , and . IT Professional, 14 (1): 32-37 (2012)An Analytic Hierarchy Process-Based Risk Assessment Method for Wireless Networks., and . IEEE Trans. Reliability, 60 (4): 801-816 (2011)A framework for quantitative evaluation of parallel control-flow obfuscation., and . Computers & Security, 31 (8): 886-896 (2012)