Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel robotic catheter system with force and visual feedback for vascular interventional surgery., , , , , , and . IJMA, 2 (1): 15-24 (2012)A learning-based anomaly detection model of SQL attacks., , and . WCNIS, page 639-642. IEEE, (2010)Linear system finite-time stabilization under H∞ constraint., , , and . CCECE, page 329-332. IEEE, (2011)Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits., , , , and . CANS, volume 5339 of Lecture Notes in Computer Science, page 49-63. Springer, (2008)Finger Vein Image Registration Based on Genetic Algorithm., , , , , and . ICGEC, volume 834 of Advances in Intelligent Systems and Computing, page 183-191. Springer, (2018)Tracking trends: incorporating term volume into temporal topic models., , , and . KDD, page 484-492. ACM, (2011)A Novel Method for Protein Subcellular Localization Based on Boosting and Probabilistic Neural Network.., , and . APBC, volume 29 of CRPIT, page 21-27. Australian Computer Society, (2004)Practical Pseudo-collisions for Hash Functions ARIRANG-224/384., , , , and . Selected Areas in Cryptography, volume 5867 of Lecture Notes in Computer Science, page 141-156. Springer, (2009)End-to-End Automated Verification for OS Kernels., , and . APSEC, page 139-148. IEEE, (2018)Multilevel cooperative on-line computing architecture under dispatching cloud., , , , and . IECON, page 339-344. IEEE, (2017)