Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High precision rotation angle estimation for rotated images., , and . ICME Workshops, page 1-4. IEEE Computer Society, (2013)Part-based multi-graph ranking for visual tracking., , , and . ICIP, page 1714-1718. IEEE, (2016)Latent Topic Visual Language Model for Object Categorization., , , and . SIGMAP, page 149-158. SciTePress, (2011)Targeted attack and security enhancement on texture synthesis based steganography., , , , and . J. Visual Communication and Image Representation, (2018)Potential risk of IoT device supporting IR remote control., , , and . Computer Networks, (2019)Real-Time Online Multi-Object Tracking in Compressed Domain., , , , and . IEEE Access, (2019)JamSys: Coverage Optimization of a Microphone Jamming System Based on Ultrasounds., , , , and . IEEE Access, (2019)Robust FMO algorithm and adaptive redundant slice allocation for wireless video transmission., , , and . Telecommunication Systems, 59 (3): 357-363 (2015)Mobile cloud computing based privacy protection in location-based information survey applications., , and . Security and Communication Networks, 8 (6): 1006-1025 (2015)RandTest: Towards more secure and reliable dataflow processing in cloud computing., , , and . CDC, page 180-184. IEEE Computer Society, (2011)