Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Determining Image Origin and Integrity Using Sensor Noise., , , and . IEEE Trans. Information Forensics and Security, 3 (1): 74-90 (2008)Simulation of Metal Droplet Sputtering and Molten Pool on Copper Contact under Electric Arc., , , and . IEICE Transactions, 101-C (9): 691-698 (2018)On Infusing Reachability-Based Safety Assurance within Probabilistic Planning Frameworks for Human-Robot Vehicle Interactions., , , , , and . CoRR, (2018)Robust Sequential Path Planning Under Disturbances and Adversarial Intruder., , , and . CoRR, (2016)Clustering via Random Walk Hitting Time on Directed Graphs., , and . AAAI, page 616-621. AAAI Press, (2008)Safe Sequential Path Planning of Multi-Vehicle Systems via Double-Obstacle Hamilton-Jacobi-Isaacs Variational Inequality., , , and . CoRR, (2014)Deep Residual Network for Steganalysis of Digital Images., , and . IEEE Trans. Information Forensics and Security, 14 (5): 1181-1193 (2019)Removing Leaking Corners to Reduce Dimensionality in Hamilton-Jacobi Reachability., , and . ICRA, page 9320-9326. IEEE, (2019)Evaluating Probabilistic Spatial-Range Closest Pairs Queries over Uncertain Objects., , , , and . WAIM, volume 6897 of Lecture Notes in Computer Science, page 602-613. Springer, (2011)Reach-Avoid Games Via Mixed-Integer Second-Order Cone Programming., , , and . CDC, page 4409-4416. IEEE, (2018)