Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comparison between Windows Mobile and Symbian S60 Embedded Forensics., , and . IIH-MSP, page 546-550. IEEE Computer Society, (2009)Paraphrase Detection Based on Identical Phrase and Similar Word Matching., , and . PACLIC, ACL, (2015)Vietnamese Paraphrase Identification Using Matching Duplicate Phrases and Similar Words., , , , and . FDSE, volume 11251 of Lecture Notes in Computer Science, page 172-182. Springer, (2018)Effectiveness of Detection-based and Regression-based Approaches for Estimating Mask-Wearing Ratio., , , , and . FG, page 1-8. IEEE, (2021)Analysis of Master Vein Attacks on Finger Vein Recognition Systems., , , and . WACV, page 1900-1908. IEEE, (2023)How Can We Acquire the Most Common Query Types in Two-Tiered Wireless Sensor Networks?, , , and . NGMAST, page 111-115. IEEE, (2013)Enhancement of method for preventing illegal recording of movies to enable it to detect cameras with attached infrared-cut filter., , and . ICASSP, page 1825-1828. IEEE, (2012)High-Quality Nonparallel Voice Conversion Based on Cycle-Consistent Adversarial Network., , , and . ICASSP, page 5279-5283. IEEE, (2018)Real-time video watermark embedding system using software on personal computer., , , , and . SMC, page 3369-3373. IEEE, (2005)BiometricJammer: Use of Pseudo Fingerprint to Prevent Fingerprint Extraction from Camera Images without Inconveniencing Users., and . SMC, page 2825-2831. IEEE, (2018)