Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Convolutional neural network using multi-scale information for stereo matching cost computation., and . ICIP, page 3424-3428. IEEE, (2016)MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature., , , and . IACR Cryptology ePrint Archive, (2013)A Pedestrian-Pedestrian and Pedestrian-Vehicle Interaction Motion Model for Pedestrians Tracking., , , , and . ISVC (1), volume 8887 of Lecture Notes in Computer Science, page 270-280. Springer, (2014)Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing., , , , , and . HCC, volume 11354 of Lecture Notes in Computer Science, page 169-180. Springer, (2018)A secure blockchain-based group key agreement protocol for IoT., , , , and . J. Supercomput., 77 (8): 9046-9068 (2021)Iterative Multiple Hypothesis Tracking With Tracklet-Level Association., , , , , and . IEEE Trans. Circuits Syst. Video Technol., 29 (12): 3660-3672 (2019)On the Construction of a Post-Quantum Blockchain for Smart City., , , and . CoRR, (2020)A Jumping Mining Attack and Solution., , , and . CoRR, (2020)Enhancing Detection Model for Multiple Hypothesis Tracking., , , and . CVPR Workshops, page 2143-2152. IEEE Computer Society, (2017)Ultrawideband Tomographic Imaging in Multipath-Rich Environment., , , , , and . IEEE Geosci. Remote. Sens. Lett., (2022)