Author of the publication

Artistic information extraction from Chinese calligraphy works via Shear-Guided filter.

, , , , , , and . J. Vis. Commun. Image Represent., (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality., , , , , , , , and . Mob. Inf. Syst., (2016)Using Generative Adversarial Networks to Break and Protect Text Captchas., , , , , , , , and . ACM Trans. Priv. Secur., 23 (2): 7:1-7:29 (2020)Prioritizing the Data in the Target-Tracking Wireless Sensor Networks., , , , , , and . GreenCom/iThings/CPScom, page 1910-1915. IEEE, (2013)Poster: HALL: High-accuracy and Low-cost RFID Localization in Large-scale environment., , , and . MobiSys (Companion Volume), page 17. ACM, (2016)Maximizing throughput for low duty-cycled sensor networks., , , , , , , and . Comput. Networks, (2018)Cantor: Improving Goodput in LoRa Concurrent Transmission., , , , , , and . IEEE Internet Things J., 8 (3): 1519-1532 (2021)Content caching with virtual spatial locality in Cellular Network., , , , , , , and . Pervasive Mob. Comput., (2017)FISCP: fine-grained device-free positioning system for multiple targets working in sparse deployments., , , , , , and . Wireless Networks, 22 (5): 1751-1766 (2016)Semantics-aware obfuscation scheme prediction for binary., , , , , , and . Comput. Secur., (2020)Approximate Convex Decomposition Based on Connectivity in Large-scale 3DWireless Sensor Networks., , , , , , and . Ad Hoc Sens. Wirel. Networks, 35 (1-2): 41-66 (2017)