Author of the publication

Protecting Biometric Data for Personal Identification.

, , and . SINOBIOMETRICS, volume 3338 of Lecture Notes in Computer Science, page 629-638. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computationally efficient model of an active magnetic regenerator., , , , and . ICCSCE, page 135-140. IEEE, (2015)Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud., , , and . IEEE Trans. Computers, 65 (6): 1775-1788 (2016)Node Localization for Distributed Simulation Based on Logical Node Group in Simulation Grid., , , , and . Edutainment, volume 6249 of Lecture Notes in Computer Science, page 298-306. Springer, (2010)A Path Planning Method Based on Multi- Objective Cauchy Mutation Cat Swarm Optimization Algorithm for Navigation System of Intelligent Patrol Car., , , , and . IEEE Access, (2020)Weighted Non-locally Self-similarity Sparse Representation for Face Deblurring., , , and . ACCV Workshops (1), volume 10116 of Lecture Notes in Computer Science, page 576-589. Springer, (2016)Bipartite Consensus on Coopetition Networks With Time-Varying Delays., , , and . IEEE Access, (2018)Ddelta: A deduplication-inspired fast delta compression approach., , , , , and . Perform. Evaluation, (2014)A topic-based multi-channel attention model under hybrid mode for image caption., and . Neural Comput. Appl., 34 (3): 2207-2216 (2022)Research on Improvement of the Click-Through Rate Prediction Model Based on Differential Privacy., , , , , and . IEEE Access, (2022)3GPP Standardized 5G Channel Model for IIoT Scenarios: A Survey., , , , , , , , , and . IEEE Internet Things J., 8 (11): 8799-8815 (2021)