Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Key Generation for SM9-Based Systems., , , , and . Inscrypt, volume 12612 of Lecture Notes in Computer Science, page 113-129. Springer, (2020)Amodal Segmentation Based on Visible Region Segmentation and Shape Prior., , , , , and . CoRR, (2020)A Time-optimal Trajectory Generation Algorithm for Quadrotors with Various States Constraints., , , , , and . ICARM, page 880-885. IEEE, (2018)Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction., , and . ICICS, volume 14252 of Lecture Notes in Computer Science, page 215-234. Springer, (2023)Tightly Secure Two-Pass Authenticated Key Exchange Protocol in the CK Model., , and . CT-RSA, volume 12006 of Lecture Notes in Computer Science, page 171-198. Springer, (2020)Memorizing Structure-Texture Correspondence for Image Anomaly Detection., , , , , , , , and . IEEE Trans. Neural Networks Learn. Syst., 33 (6): 2335-2349 (2022)Amodal Segmentation Based on Visible Region Segmentation and Shape Prior., , , , , and . AAAI, page 2995-3003. AAAI Press, (2021)Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls - Secure and Efficient Fine-Grained Access Control on Corrupted Machines., , , , , and . ESORICS (2), volume 11099 of Lecture Notes in Computer Science, page 507-526. Springer, (2018)Compensate Quantization Errors: Make Weights Hierarchical to Compensate Each Other., , , , , , and . CoRR, (2024)Bridging 3D Gaussian and Mesh for Freeview Video Rendering., , , , , , , , and . CoRR, (2024)