Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Can feature-based inductive transfer learning help person re-identification?, , , and . ICIP, page 2812-2816. IEEE, (2013)Pedestrian detection using background subtraction assisted Support Vector Machine., , , and . ISDA, page 837-842. IEEE, (2011)Practical Quantum No-key Protocol with Identification., and . IAS, page 540-543. IEEE Computer Society, (2009)An Improved Network Intrusion Detection Method based on VQ-SVM., , and . IASTED PDCS, page 583-587. IASTED/ACTA Press, (2005)A fine-grained understanding of emotions: Young children match within-valence emotional expressions to their causes., , and . CogSci, cognitivesciencesociety.org, (2015)A fused method for news recommendation., , and . BigComp, page 341-344. IEEE Computer Society, (2016)Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation., , , and . Security and Communication Networks, 8 (18): 3356-3371 (2015)Integrating a statistical background- foreground extraction algorithm and SVM classifier for pedestrian detection and tracking., , , , and . Integrated Computer-Aided Engineering, 20 (3): 201-216 (2013)Neighborhood discriminant projection for face recognition., , , and . Pattern Recognition Letters, 28 (10): 1156-1163 (2007)Locality-Constrained Collaborative Sparse Approximation for Multiple-Shot Person Re-identification., , and . ACPR, page 140-144. IEEE, (2013)