Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight Signature-based Range Proof., , and . ICTC, page 1862-1865. IEEE, (2022)LSFD: Lightweight Single Stage Masked Face Detector with a CPU Real-time Speed., , and . ICTC, page 1818-1822. IEEE, (2021)A Cancellable Ranking Based Hashing Method for Fingerprint Template Protection., , , , , and . MONAMI, volume 235 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 378-389. Springer, (2017)Deep rank hashing network for cancellable face identification., , , , and . Pattern Recognit., (2022)Privacy-preserving data cube for electronic medical records: An experimental evaluation., , and . Int. J. Medical Informatics, (2017)Anomaly detection of access patterns in database., , and . ICTC, page 1112-1115. IEEE, (2015)Design of aging-resistant Wi-Fi fingerprint-based localization system with continuous active learning., and . ICACT, page 1054-1059. IEEE, (2018)Adaptive-Tangent Space Representation for Image Retrieval Based on Kansei., , , , , , and . MICAI, volume 4293 of Lecture Notes in Computer Science, page 828-837. Springer, (2006)Keystroke dynamics for authentication in smartphone., , and . ICTC, page 1155-1159. IEEE, (2016)Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing., , , , and . IEEE Trans. Inf. Forensics Secur., 13 (2): 393-407 (2018)