Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unsupervised social media events clustering using user-centric parallel split-n-merge algorithms., , and . ICASSP, page 4798-4802. IEEE, (2014)NII, Japan at MediaEval 2011 Violent Scenes Detection Task., , , and . MediaEval, volume 807 of CEUR Workshop Proceedings, CEUR-WS.org, (2011)A Provably Secure User Authentication Scheme Over Unreliable Networks., , , and . AINA (1), volume 449 of Lecture Notes in Networks and Systems, page 602-613. Springer, (2022)XPROB - A Generalized Pool-Based Anonymous Communication Framework., , and . IIH-MSP, page 52-55. IEEE Computer Society, (2009)The Extended Rijndael-like Block Ciphers., , and . ITCC, page 183-189. IEEE Computer Society, (2002)Query-adaptive late fusion with neural network for instance search., , , , , and . MMSP, page 1-6. IEEE, (2015)Robust Biometrics-Based Remote User Authentication Scheme Using Smart Cards., , and . NBiS, page 384-391. IEEE Computer Society, (2012)Local Descriptors without Orientation Normalization to Enhance Landmark Regconition., , , , and . KSE (1), volume 244 of Advances in Intelligent Systems and Computing, page 401-413. Springer, (2013)NII-UIT: A Tool for Known Item Search by Sequential Pattern Filtering., , , , , , and . MMM (2), volume 8326 of Lecture Notes in Computer Science, page 419-422. Springer, (2014)Binomial-Mix-Based Location Anonymizer System with Global Dummy Generation to Preserve User Location Privacy in Location-Based Services., , and . ARES, page 580-585. IEEE Computer Society, (2010)