Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A quantum secret sharing scheme with verifiable function., , , and . CoRR, (2020)A Hybrid Quantum Secret Sharing Scheme Based on Mutually Unbiased Bases., , , and . FCS, volume 1286 of Communications in Computer and Information Science, page 595-607. Springer, (2020)A Verifiable Quantum Secret Sharing Scheme Based on a Single Qubit., , , and . CoRR, (2020)Peer-assisted packet loss repair for IPTV video multicast., , , and . ACM Multimedia, page 401-410. ACM, (2009)Scale- and Rotation-Invariant Local Binary Pattern Using Scale-Adaptive Texton and Subuniform-Based Circular Shift., , , and . IEEE Trans. Image Processing, 21 (4): 2130-2140 (2012)QoS-aware multicast protocol using bounded flooding (QMBF) technique., and . ICC, page 1259-1263. IEEE, (2002)Development of a tele-nursing mobile manipulator for remote care-giving in quarantine areas., , , , and . ICRA, page 3581-3586. IEEE, (2017)Fixing multi-client oscillations in HTTP-based adaptive streaming: A control theoretic approach., , , , and . MMSP, page 230-235. IEEE, (2013)A gait recognition system for rehabilitation based on wearable micro inertial measurement unit., and . ROBIO, page 1678-1682. IEEE, (2011)Research on Spatial Target Classification and Recognition Technology Based on Deep Learning., , , , , , , , and . ICIRA (4), volume 11743 of Lecture Notes in Computer Science, page 331-340. Springer, (2019)