Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust 3D Face Recognition by Using Shape Filtering., and . BMVC, page 1-11. British Machine Vision Association, (2010)A Robust Registration and Detection Method for Color Seal Verification., and . ICIC (1), volume 3644 of Lecture Notes in Computer Science, page 97-106. Springer, (2005)Blockchain in China., , , , and . Commun. ACM, 64 (11): 88-93 (2021)Description of Configuration Transformation Matrix of Reconfigurable Mechanism and Automatic Retrieval and Recognition of Motion Mode., , and . ICIRA (9), volume 14275 of Lecture Notes in Computer Science, page 110-123. Springer, (2023)Application of Adaptive Sub-band Filters on Active Noise Control., , , and . SPML, page 106-111. ACM, (2022)TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion., and . HotSec, USENIX Association, (2011)ESM2-Tree: An maintenance efficient authentication data structure in blockchain., , , , and . SSDBM, page 7:1-7:12. ACM, (2023)On the Practicality of Motion Based Keystroke Inference Attack., and . TRUST, volume 7344 of Lecture Notes in Computer Science, page 273-290. Springer, (2012)Triangulation topology aggregation optimizer: A novel mathematics-based meta-heuristic algorithm for continuous optimization and engineering applications., , , and . Expert Syst. Appl., 238 (Part B): 121744 (March 2024)Categorizing and Predicting Invalid Vulnerabilities on Common Vulnerabilities and Exposures., , , , and . APSEC, page 345-354. IEEE, (2018)