Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lattice Attack on the Knapsack Cipher 0/255., and . INCoS, page 577-580. IEEE, (2012)Implementation of multi-standard video decoding algorithms on a coarse-grained reconfigurable multimedia processor., , , , , , , , and . ISCAS, page 897-900. IEEE, (2013)Implementation of multi-standard video decoder on a heterogeneous coarse-grained reconfigurable processor., , , , , , , , and . SCIENCE CHINA Information Sciences, 57 (8): 1-14 (2014)A distributed approach for large-scale classifier training and image classification., , , and . Neurocomputing, (2014)Learning group-based dictionaries for discriminative image representation., , , , , and . Pattern Recognition, 47 (2): 899-913 (2014)Training inter-related classifiers for automatic image classification and annotation., , , , and . Pattern Recognition, 46 (5): 1382-1395 (2013)A hybrid quantum-based PIO algorithm for global numerical optimization., , , , and . SCIENCE CHINA Information Sciences, 62 (7): 70203:1-70203:12 (2019)Camera Calibration Based on the RBF Neural Network with Tunable Nodes forVisual Servoing in Robotics., , , and . IROS, page 5708-5712. IEEE, (2006)Interior Permanent Magnet Motors With Reduced Torque Pulsation., and . IEEE Trans. Industrial Electronics, 55 (2): 602-609 (2008)High-Rate Oblique Deposition of SiO2 Films Using Two Sputtering Sources., , , , and . IEICE Transactions, 91-C (10): 1644-1648 (2008)