Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Moving Object Contour Detection Based on S-T Characteristics in Surveillance., , and . HCI (8), volume 4557 of Lecture Notes in Computer Science, page 575-583. Springer, (2007)Knowledge Migration Based Multi-population Cultural Algorithm., , , and . ICNC (4), page 331-335. IEEE Computer Society, (2009)Data Reliability Analysis for Flooding Transmission of Wireless Sensor Networks., and . ICICA (1), volume 307 of Communications in Computer and Information Science, page 476-483. Springer, (2012)An improved evolutionary multi-objective optimization method., , and . BIC-TA, page 464-468. IEEE, (2010)Satellite-Relayed Intercontinental Quantum Network, , , , , , , , , and 26 other author(s). Phys. Rev. Lett., (January 2018)A Shot Boundary Detection Method Based on Color Space., , , and . ICEE, page 1647-1650. IEEE Computer Society, (2010)An analog gamma correction method for high dynamic range applications., and . SoCC, page 318-322. IEEE, (2011)Automatic incident detection algorithm based on support vector machine., , and . ICNC, page 864-866. IEEE, (2010)Multiple Query-Independent Values Based Asymmetric Ranking for Approximate Nearest Neighbor Search., , , and . Trustcom/BigDataSE/ISPA, page 1628-1635. IEEE, (2016)Cluster-based distributed active current timer for hardware Trojan detection., , and . ISCAS, page 1010-1013. IEEE, (2013)