Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators., , , and . Inscrypt, volume 7763 of Lecture Notes in Computer Science, page 294-310. Springer, (2012)Simultaneous facial activity tracking and recognition., , and . ICPR, page 1017-1020. IEEE Computer Society, (2012)A unified probabilistic framework for measuring the intensity of spontaneous facial action units., , , and . FG, page 1-7. IEEE Computer Society, (2013)MomentSA: A Fast and Accurate Method for Stochastic Kronecker Graph Parameter Computing., , , , and . CSCWD, page 158-163. IEEE, (2018)Multi-modal Emotion Recognition Based on Speech and Image., , , and . PCM (1), volume 10735 of Lecture Notes in Computer Science, page 844-853. Springer, (2017)A structural topology design method based on principal stress line., , and . Computer-Aided Design, (2016)Streetlamp extraction and identification from mobile LiDAR point cloud scenes., , , , , and . IGARSS, page 1468-1471. IEEE, (2016)Unsupervised domain adaptation techniques based on auto-encoder for non-stationary EEG-based emotion recognition., , , , , and . Comp. in Bio. and Med., (2016)On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions., , , and . IACR Cryptology ePrint Archive, (2015)A Matrix Approach for Constructing Quadratic APN Functions., , and . IACR Cryptology ePrint Archive, (2013)