Author of the publication

Poster: Just-Microsecond Deblurring System on the Mobile Phone.

, , , , and . EWSN, page 230-231. Junction Publishing, Canada / ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Advanced Ensemble Deep Random Vector Functional Link for Eye-Tracking-based Situation Awareness Recognition., , , , and . SSCI, page 300-307. IEEE, (2022)A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones., , , and . FSE, volume 8424 of Lecture Notes in Computer Science, page 485-501. Springer, (2013)A benchmarking framework for eye-tracking-based vigilance prediction of vessel traffic controllers., , , , and . Eng. Appl. Artif. Intell., (2024)Learning to Recommend via Inverse Optimal Matching., , , and . CoRR, (2018)Poster: Just-Microsecond Deblurring System on the Mobile Phone., , , , and . EWSN, page 230-231. Junction Publishing, Canada / ACM, (2017)On Algebraic Property of T-Functions., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (1): 267-269 (2012)SQUARE attack on block ciphers with low algebraic degree., , , and . Sci. China Inf. Sci., 53 (10): 1988-1995 (2010)Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing., , , , , and . USENIX Security Symposium, page 4499-4515. USENIX Association, (2023)Exploring the Effectiveness of Fully Online Translation Learning During COVID-19., , , and . ICWL/SETE, volume 12511 of Lecture Notes in Computer Science, page 344-356. Springer, (2020)Enhancing Anonymity of Bitcoin Based on Ring Signature Algorithm., , , , , and . CIS, page 317-321. IEEE Computer Society, (2017)