Author of the publication

The Ninth Visual Object Tracking VOT2021 Challenge Results.

, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and . ICCVW, page 2711-2738. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Clustering-Based Bipartite Graph Privacy-Preserving Approach for Sharing High-Dimensional Data., and . International Journal of Software Engineering and Knowledge Engineering, 24 (7): 1091- (2014)A Personalized Privacy Preserving Method for Publishing Social Network Data., , and . TAMC, volume 8402 of Lecture Notes in Computer Science, page 141-157. Springer, (2014)Automated synthesis of composite services with correctness guarantee., , , , and . WWW, page 1127-1128. ACM, (2009)Mining Item Popularity for Recommender Systems., , , and . ADMA (2), volume 8347 of Lecture Notes in Computer Science, page 372-383. Springer, (2013)Algebra model and security analysis for cryptographic protocols., and . Science in China Series F: Information Sciences, 47 (2): 199-220 (2004)Distributed Access Control in CROWN Groups., , , and . ICPP, page 435-442. IEEE Computer Society, (2005)Dynamic Authentication for Cross-Realm SOA-Based Business Processes., , , and . IEEE Trans. Services Computing, 5 (1): 20-32 (2012)Privacy-Preserving Trajectory Publication against Parking Point Attacks., , , and . UIC/ATC, page 569-574. IEEE Computer Society, (2013)M-generalization for multipurpose transactional data publication., , , and . Frontiers Comput. Sci., 12 (6): 1241-1254 (2018)A Sensitivity-Adaptive ρ-Uncertainty Model for Set-Valued Data., , , and . Financial Cryptography, volume 9603 of Lecture Notes in Computer Science, page 460-473. Springer, (2016)