Author of the publication

SiftKeyPre: A Vehicle Recognition Method Based on SIFT Key-Points Preference in Car-Face Image.

, , , and . CCCV (2), volume 547 of Communications in Computer and Information Science, page 344-358. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study on the Non-Dedicated Grid Scheduling System., , , , and . SKG, page 386-389. IEEE Computer Society, (2007)Research on Credit Evaluation Model and Algorithm for B2B e-Commerce., , , and . ICEBE, page 606-609. IEEE Computer Society, (2008)A New Multi-quality Image Fusion Method in Visual Sensor Network., , , , and . IIH-MSP, page 667-670. IEEE Computer Society, (2007)Research on Customer Segmentation Method for Multi-value-Chain Collaboration., , , , and . ChineseCSCW, volume 1042 of Communications in Computer and Information Science, page 197-211. Springer, (2019)Privacy-preserving governmental data publishing: A fog-computing-based differential privacy approach., , , , and . Future Generation Comp. Syst., (2019)UniDegree: A GPU-Based Graph Representation for SSSP., , , , and . ICA3PP (2), volume 9529 of Lecture Notes in Computer Science, page 704-715. Springer, (2015)Performance Evaluation of Auto Parts Suppliers for Collaborative Optimization of Multi-value Chains., , , and . ChineseCSCW, volume 1042 of Communications in Computer and Information Science, page 81-91. Springer, (2019)User privacy protection for a mobile commerce alliance., , , and . Electronic Commerce Research and Applications, (2016)A packet-reordering covert channel over VoLTE voice and video traffics., , , , , and . J. Network and Computer Applications, (2019)Cloud-Based Car Image Retrieval with Interactive Script., , , , , and . HCC, volume 8944 of Lecture Notes in Computer Science, page 584-597. Springer, (2014)