Author of the publication

A Trusted Computing Architecture for Secure Substation Automation.

, , , , , and . CRITIS, volume 7722 of Lecture Notes in Computer Science, page 130-142. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Perceptual Organization Based on Temporal Dynamics., and . NIPS, page 38-44. The MIT Press, (1999)A Computational Geometric Approach to Shape Analysis in Images., , , and . NIPS, page 1579-1586. MIT Press, (2003)Linear Representation Learning Using Sphere Factor Analysis., , and . ICMLA, page 12-17. IEEE Computer Society, (2009)Scalable optimal linear representation for face and object recognition., , and . ICMLA, page 298-303. IEEE Computer Society, (2007)Saliency-aware inter-image color transfer for image manipulation., , , , and . Multimedia Tools Appl., 78 (15): 21629-21644 (2019)Overfitting Mechanism and Avoidance in Deep Neural Networks., and . CoRR, (2019)A Prototype of the Web-Based Marine Training Environment., , and . ICWL, volume 3583 of Lecture Notes in Computer Science, page 78-85. Springer, (2005)Saliency-Guided Image Style Transfer., , , and . ICME Workshops, page 66-71. IEEE, (2019)A Model of Volumetric Shape for the Analysis of Longitudinal Alzheimer's Disease Data., , , , and . ECCV (3), volume 6313 of Lecture Notes in Computer Science, page 594-606. Springer, (2010)Efficient Mining of Repetitions in Large-Scale TV Streams with Product Quantization Hashing., , , , and . ECCV Workshops (1), volume 7583 of Lecture Notes in Computer Science, page 271-280. Springer, (2012)