Author of the publication

RFID Privacy Protection Scheme for Secure Ubiquitous Computing.

, , and . IWRT, page 117-124. INSTICC PRESS, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Incremental Learning Algorithm using Evolutionary Logic Networks for Real-Value Inputs., and . IJCNN, page 2047-2054. IEEE, (2006)The Visual Object Tracking VOT2014 Challenge Results., , , , , , , , , and 47 other author(s). ECCV Workshops (2), volume 8926 of Lecture Notes in Computer Science, page 191-217. Springer, (2014)Action Chart: A Representation for Efficient Recognition of Complex Activity., , , , , and . BMVC, BMVA Press, (2013)The Design and Evaluation of Policy-Controllable Buffer Cache., , , and . ICPADS, page 764-771. IEEE Computer Society, (1997)A Secure Communication Protocol for Low-Cost RFID System., , and . CIT, page 949-954. IEEE Computer Society, (2007)Attentional Correlation Filter Network for Adaptive Visual Tracking., , , , , and . CVPR, page 4828-4837. IEEE Computer Society, (2017)Adaptive nonlinear equalizer with reduced computational complexity, , and . Signal Processing, 47 (3): 307--317 (December 1995)RFID Privacy Protection Scheme for Secure Ubiquitous Computing., , and . IWRT, page 117-124. INSTICC PRESS, (2007)Gaussian Mixture Proposals with Pull-Push Learning Scheme to Capture Diverse Events for Weakly Supervised Temporal Video Grounding., , , , and . AAAI, page 2795-2803. AAAI Press, (2024)Knowledge Distillation with Adversarial Samples Supporting Decision Boundary., , , and . AAAI, page 3771-3778. AAAI Press, (2019)