Author of the publication

A system for identifying an anti-counterfeiting pattern based on the statistical difference in key image regions.

, , , , , , , and . Expert Syst. Appl., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Neural network prediction of ascorbic acid degradation in green asparagus during thermal treatments., , , , , and . Expert Syst. Appl., 38 (5): 5591-5602 (2011)DTSTM: Dynamic Tree Style Trust Measurement Model for Cloud Computing., , , , and . TIIS, 8 (1): 305-325 (2014)Learning to detect texture objects by artificial immune approaches., , and . Future Generation Comp. Syst., 20 (7): 1197-1208 (2004)Face Recognition Scheme based on HSI-PCNN., , and . Journal of Multimedia, 8 (5): 573-579 (2013)On the System Optimum Dynamic Traffic Assignment and Earliest Arrival Flow Problems., , and . Transportation Science, 49 (1): 13-27 (2015)Semantics-based Access Control Approach for Web Service., , , , and . JCP, 6 (6): 1152-1161 (2011)A practical solution for KKT systems., and . Numerical Algorithms, 46 (2): 105-119 (2007)RCM-Fuzzy Model and Its Applications to Maintenance with Cost/Serviceability Optimization., , , and . ICAIC (4), volume 227 of Communications in Computer and Information Science, page 555-566. Springer, (2011)Research on Context-aware Scheduling Algorithm Based on Correlation in Smart Home Environment., , and . IPDPS Workshops, page 2312-2315. IEEE Computer Society, (2012)The Problems of Unification and Coordination in the Development of E-Government in China., , and . IFITA (3), page 538-540. IEEE Computer Society, (2009)