Author of the publication

Laser Printer Source Forensics for Arbitrary Chinese Characters.

, , , , and . Security and Management, page 356-360. CSREA Press, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of an Ultra-low Voltage 9T SRAM With Equalized Bitline Leakage and CAM-Assisted Energy Efficiency Improvement., , , , , and . IEEE Trans. on Circuits and Systems, 62-I (2): 441-448 (2015)Calibrating low-rank correlation matrix problem: an SCA-based approach., and . Optimization Methods and Software, 29 (3): 561-582 (2014)A Unified Probabilistic Framework for Name Disambiguation in Digital Library., , , and . IEEE Trans. Knowl. Data Eng., 24 (6): 975-987 (2012)Hybridizable discontinuous Galerkin method (HDG) for Stokes interface flow., and . J. Comput. Physics, (2013)A low-kickback-noise and low-voltage latched comparator for high-speed folding and interpolating ADC., , , and . IEICE Electronic Express, 5 (22): 943-948 (2008)SRAM devices and circuits optimization toward energy efficiency in multi-Vth CMOS., , and . Microelectronics Journal, 46 (3): 265-272 (2015)Online recruitment information as an indicator to appraise enterprise performance., and . Online Information Review, 36 (6): 903-918 (2012)Query-dependent cross-domain ranking in heterogeneous network., , , , , and . Knowl. Inf. Syst., 34 (1): 109-145 (2013)Reliable and efficient opportunistic multicast routing for MANETs., , , and . IJPEDS, 27 (3): 193-203 (2012)Analysis of DNA Sequence Pattern Using Probabilistic Neural Network Model., , , and . Journal of Research and Practice in Information Technology, (2005)