Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tightly-secure two-pass authenticated key exchange protocol using twin Diffie-Hellman problem., and . IET Inf. Secur., 14 (6): 764-772 (2020)Fast and Regularized Reconstruction of Building Façades from Street-View Images using Binary Integer Programming., , , and . CoRR, (2020)Exact Boundary Controllability of Nodal Profile for Quasilinear Hyperbolic Systems and Its Asymptotic Stability., and . SIAM J. Control. Optim., 61 (1): 1-21 (February 2023)Robust regularized feature selection for iris recognition via linear programming., , and . ICPR, page 3358-3361. IEEE Computer Society, (2012)Dynamic Pricing in Spatial Crowdsourcing: A Matching-Based Approach., , , , , and . SIGMOD Conference, page 773-788. ACM, (2018)Procrastination-Aware Scheduling: A Bipartite Graph Perspective., , , , and . ICDE, page 1650-1653. IEEE, (2019)Attention reweighted sparse subspace clustering., , , and . Pattern Recognit., (July 2023)Semantic Image Translation for Repairing the Texture Defects of Building Models., , , , , and . IEEE Trans. Geosci. Remote. Sens., (2024)StructuredMesh: 3-D Structured Optimization of Façade Components on Photogrammetric Mesh Models Using Binary Integer Programming., , , , and . IEEE Trans. Geosci. Remote. Sens., (2024)Observer-Based Fuzzy Adaptive Command Filtering Finite-Time Control of Stochastic Nonlinear Systems., , and . SPAC, page 1-6. IEEE, (2021)