Author of the publication

Privacy-Preserving Video Fall Detection via Chaotic Compressed Sensing and GAN-Based Feature Enhancement.

, , , , and . IEEE Multim., 29 (4): 14-23 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bewley's limiting approach to infinite dimensional economies with l.s.c. preferences. Economics Letters, 92 (1): 7--13 (July 2006)Validation of the AmpC β-Lactamase Binding Site and Identification of Inhibitors with Novel Scaffolds., , , , , , , and . Journal of Chemical Information and Modeling, 52 (5): 1367-1375 (2012)A summary of the effects of afforestation and deforestation on annual water yields., and . IGARSS, page 2266-2269. IEEE, (2005)A Robust Control Approach for Double-Pendulum Overhead Cranes With Unknown Disturbances., , , , and . ICARM, page 510-515. IEEE, (2019)A novel pre-active routing based positioning scheme for location based services in indoor environment., , , and . ICTC, page 173-175. IEEE, (2015)Optimization and simulation on key parameters of foot trajectory for a hydraulic quadruped robot., , , and . ROBIO, page 1454-1459. IEEE, (2017)Boundary scan based interconnect testing design for silicon interposer in 2.5D ICs., , and . Integr., (2020)Nonlinear Motion Control of Underactuated Three-Dimensional Boom Cranes With Hardware Experiments., , , , and . IEEE Trans. Ind. Informatics, 14 (3): 887-897 (2018)Test Scheduling of Interposer-Based 2.5-D ICs Using Enhanced Differential Evolution Algorithm., , and . WISATS (1), volume 280 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 537-549. Springer, (2019)Low-Cost Authentication Protocol of the RFID System Using Partial ID., , , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 598-604. Springer, (2006)