Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia., , , and . ICIP (2), page 133-136. IEEE, (2007)Design optimisation and performance evaluation of a toroidal magnetorheological hydraulic piston head., , , , , and . IROS, page 350-355. IEEE, (2016)Spontaneous Facial Expression Recognition Based on Feature Point Tracking., , and . ICIG, page 760-765. IEEE Computer Society, (2011)Binary forensic code for multimedia signals: resisting minority collusion attacks., , and . Media Forensics and Security, volume 7254 of SPIE Proceedings, page 725411. SPIE, (2009)Light-weight reference-based compression of FASTQ data., , , , , and . BMC Bioinformatics, (2015)A review of sliding mode observers based on equivalent circuit model for battery SoC estimation., , , , , and . ISIE, page 1965-1970. IEEE, (2019)Implementing Electronic Case Reporting: an Overview of Utah's Pilot Participation in Digital Bridge., , , , , and . AMIA, AMIA, (2018)CC-fog: Toward content-centric fog networks for E-health., , , , and . Healthcom, page 1-5. IEEE, (2017)Prototyping a novel platform for free-trade of digital content., , and . WebMedia, page 79-88. ACM, (2006)Minimal-redundancy-maximal-relevance feature selection using different relevance measures for omics data classification., , , and . CIBCB, page 246-251. IEEE, (2013)