Author of the publication

Image Retrieval Based on Structured Local Binary Kirsch Pattern.

, , , , and . IEICE Trans. Inf. Syst., 96-D (5): 1230-1232 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior., , , , , , and . ACSAC, page 580-593. ACM, (2023)Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering., , , , , , and . FDTC, page 29-39. IEEE Computer Society, (2014)MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation., , , , , , and . COSADE, volume 7275 of Lecture Notes in Computer Science, page 231-248. Springer, (2012)MDC-Checker: A novel network risk assessment framework for multiple domain configurations., , , , and . Comput. Secur., (2019)A Covert Attack Method Against FPGA Clouds., , , and . ATS, page 1-6. IEEE, (2023)Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition., , , , , and . Frontiers Inf. Technol. Electron. Eng., 19 (12): 1475-1499 (2018)Speaker Transformation Using Length-Variable Moving Window Based GMM., and . HIS (1), page 308-312. IEEE Computer Society, (2009)Variable Sliding Window DTW Speech Identification Algorithm., and . HIS (1), page 304-307. IEEE Computer Society, (2009)Optimized Lightweight Hardware Trojan-Based Fault Attack on DES., , , , , , and . ICPADS, page 654-661. IEEE, (2018)Image Retrieval Based on Structured Local Binary Kirsch Pattern., , , , and . IEICE Trans. Inf. Syst., 96-D (5): 1230-1232 (2013)