Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rate-Performance-Loss Optimization for Inter-Frame Deep Feature Coding From Videos., , , , and . IEEE Trans. Image Processing, 26 (12): 5743-5757 (2017)Interactive Physical Based Animation of Tree Swaying in Wind., , , , and . SNPD, page 623-628. IEEE Computer Society, (2009)Geometrical shapes and swaying movements of realistic tree: design and implementation., , , and . VRCAI, page 295-302. ACM, (2009)Scale selecting of building information statistical grids with spatial autocorrelation., , and . ICSDM, page 77-81. IEEE, (2015)Virtual Geographic Simulation of Light Distribution within Three-Dimensional Plant Canopy Models., , , , , and . ISPRS Int. J. Geo-Information, 6 (12): 405 (2017)Real Time Related Key Attack on Hummingbird-2., , , and . TIIS, 6 (8): 1946-1963 (2012)Cryptanalysis of Lightweight WG-8 Stream Cipher., , , and . IEEE Trans. Information Forensics and Security, 9 (4): 645-652 (2014)Related Key Chosen IV Attack on Grain-128a Stream Cipher., and . IEEE Trans. Information Forensics and Security, 8 (5): 803-809 (2013)Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes., , , , and . IACR Cryptology ePrint Archive, (2019)High-Fidelity Component Substitution Pansharpening by the Fitting of Substitution Data., , , and . IEEE Trans. Geoscience and Remote Sensing, 52 (11): 7380-7392 (2014)