Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A hierarchical anti-occlusion tracking algorithm based on DMPF and ORB., , , and . ICIP, page 2979-2983. IEEE, (2015)Video based basketball shooting prediction and pose suggestion system., , , , and . Multim. Tools Appl., 82 (18): 27551-27570 (July 2023)An energy-efficient and QoS-effective resource allocation scheme in WBANs., , , and . BSN, page 341-346. IEEE, (2016)Energy-Efficient Resource Allocation with QoS Support in Wireless Body Area Networks., , , and . GLOBECOM, page 1-6. IEEE, (2015)QoS-Driven Power Control for Inter-WBAN Interference Mitigation., , , and . GLOBECOM, page 1-6. IEEE, (2015)Bayesian game based power control scheme for inter-WBAN interference mitigation., , , and . GLOBECOM, page 240-245. IEEE, (2014)A Resistant Secret Sharing Scheme., , and . IAS, page 61-64. IEEE Computer Society, (2009)Attention U-Net with Dimension-Hybridized Fast Data Density Functional Theory for Automatic Brain Tumor Image Segmentation., , , , and . BrainLes@MICCAI (2), volume 12659 of Lecture Notes in Computer Science, page 81-92. Springer, (2020)On the Forward and Backward Secrecy of HLL Group Key Exchange Mechanism., , and . CIT, page 702-705. IEEE Computer Society, (2005)A Heuristic Method for Extracting Enhanced Watermarks from Digital Images., , and . IIH-MSP, page 453-456. IEEE Computer Society, (2006)