Author of the publication

Secret key generation based on private pilot under man-in-the-middle attack.

, , , , and . Sci. China Inf. Sci., 60 (10): 100307:1-100307:14 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formation mechanism of knowledge rigidity in firms., and . J. Knowl. Manag., 15 (5): 820-835 (2011)Efficient 3-D Scene Prefetching From Learning User Access Patterns., , and . IEEE Trans. Multim., 17 (7): 1081-1095 (2015)Learning Spatial and Temporal Extents of Human Actions for Action Detection., , and . IEEE Trans. Multim., 17 (4): 512-525 (2015)Non-Rigid Structure-From-Motion on Degenerate Deformations With Low-Rank Shape Deformation Model., , , and . IEEE Trans. Multim., 17 (2): 171-185 (2015)Remote Sensing Image Retrieval with Gabor-CA-ResNet and Split-Based Deep Feature Transform Network., and . Remote. Sens., 13 (5): 869 (2021)Pattern-reconfigurable antenna-assisted secret key generation from multipath fading channels., , , , , , and . Frontiers Inf. Technol. Electron. Eng., 24 (12): 1803-1814 (December 2023)Part-level Car Parsing and Reconstruction from Single Street View., , , , , , and . CoRR, (2018)Part-Level Car Parsing and Reconstruction in Single Street View Images., , , , , , and . IEEE Trans. Pattern Anal. Mach. Intell., 44 (8): 4291-4305 (2022)Viewpoint Quality Evaluation for Augmented Virtual Environment., , , and . PCM (3), volume 11166 of Lecture Notes in Computer Science, page 223-234. Springer, (2018)Interactive Video Layer Decomposition and Matting., , and . ACCV Workshops (2), volume 6469 of Lecture Notes in Computer Science, page 52-61. Springer, (2010)