Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Developing a More Reliable Aerial Photography-Based Method for Acquiring Freeway Traffic Data., , , , and . Remote. Sens., 14 (9): 2202 (2022)Highway Driving Safety Analysis and Management Based on Digital Twin., , , , and . DTPI, page 1-7. IEEE, (2023)Power-efficient live virtual reality streaming using edge offloading., , , , , , and . NOSSDAV, page 57-63. ACM, (2022)Visual privacy protection in mobile image recognition using protective perturbation., , , , , and . MMSys, page 164-176. ACM, (2022)3D Self-Deployment Algorithm in Mobile Wireless Sensor Networks., , , , and . CWSN, volume 501 of Communications in Computer and Information Science, page 27-41. Springer, (2014)Fake Gradient: A Security and Privacy Protection Framework for DNN-based Image Classification., , , , , and . ACM Multimedia, page 5510-5518. ACM, (2021)VVSec: Securing Volumetric Video Streaming via Benign Use of Adversarial Perturbation., , , , , , and . ACM Multimedia, page 3614-3623. ACM, (2020)Security-Preserving Live 3D Video Surveillance., , , , , and . MMSys, page 266-277. ACM, (2023)3D Self-Deployment Algorithm in Mobile Wireless Sensor Networks., , , , and . IJDSN, (2015)