Author of the publication

Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones.

, and . NTMS, page 1-5. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Intrusion Detection System at User Level with System-Call Interposing., and . ICETE (2), page 263-268. INSTICC Press, (2004)A proposal for the privacy leakage verification tool for Android application developers., and . ICUIMC, page 54. ACM, (2013)On zero-knowledge proofs (extended abstract): "from membership to decision"., , and . STOC, page 255-264. ACM, (2000)Checking Programs Discreetly: Demonstrating Result-Correctness Efficiently while Concealing it., , and . ISAAC, volume 1533 of Lecture Notes in Computer Science, page 59-68. Springer, (1998)A Security Analysis of Uniformly-Layered Rainbow - Revisiting Sato-Araki's Non-commutative Approach to Ong-Schnorr-Shamir Signature towards PostQuantum Paradigm., and . PQCrypto, volume 7071 of Lecture Notes in Computer Science, page 275-294. Springer, (2011)Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network., , , and . J. Networks, 7 (1): 88-100 (2012)A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks., , , , and . Comput. Commun., 35 (17): 2125-2137 (2012)Handling class Imbalance problem in Intrusion Detection System based on deep learning., , and . Int. J. Netw. Comput., 12 (2): 467-492 (2022)Eliminating Adversarial Perturbations Using Image-to-Image Translation Method., , and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 601-620. Springer, (2023)POSTER: A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses., , and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 690-694. Springer, (2023)