Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient privacy preserving location based service system., , , , and . GLOBECOM, page 576-581. IEEE, (2014)3D texture analyses within the substantia nigra of Parkinson's disease patients on quantitative susceptibility maps and R2∗ maps., , , , , , , , , and . NeuroImage, (2019)Post-Training Quantization for Longformer with Chunkwise Quantization Granularity and Optimized Percentile., , , , , , , and . ICCCS, page 27-31. IEEE, (2022)Maritime information engine., and . GrC, page 795-798. IEEE Computer Society, (2009)Efficient anonymous message submission., , , and . INFOCOM, page 2228-2236. IEEE, (2012)An identity authentication protocol in online social networks., , and . AsiaCCS, page 28-29. ACM, (2012)Detection of Synonym-Substitution Modified Articles Using Context Information., , , , , and . FGCN (1), page 134-139. IEEE Computer Society, (2008)Privacy Preserving Group Ranking., , , and . ICDCS, page 214-223. IEEE Computer Society, (2012)Abnormal Driving Detection Based on Human Pose Estimation and Facial Key Points Detection., , , , , and . ICIC (2), volume 12837 of Lecture Notes in Computer Science, page 91-102. Springer, (2021)A lightweight system to authenticate smartphones in the near field without NFC chips., , and . ICC, page 6391-6395. IEEE, (2013)