Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Extended Role-Based Access Control for Web Services., , and . SECRYPT, page 471-474. INSTICC Press, (2006)Lower Bounds on the Algebraic Immunity of Boolean Functions, and . CoRR, (2006)Vectorial Resilient $PC(l)$ of Order $k$ Boolean Functions from AG-Codes, , and . CoRR, (2006)Efficient Stereo Matching by Local Linear Filtering and Improved Dynamic Programming., , and . CCPR, volume 321 of Communications in Computer and Information Science, page 113-120. Springer, (2012)Emergent LBS: If GNSS Fails, How Can 5G-enabled Vehicles Get Locations Using Fogs?, , and . IWCMC, page 597-602. IEEE, (2019)Smart NCAP supporting Low-Rate DDoS Detection for IEEE 21451-1-5 Internet of Things., , , , and . ICPS, page 532-535. IEEE, (2019)Rotational Direction Detection Using Tactile Sensor and External Camera.. AIM, page 1456-1461. IEEE, (2019)A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold., , , and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 283-292. Springer, (2009)End-to-end pixelwise surface normal estimation with convolutional neural networks and shape reconstruction using GelSight sensor., , and . ROBIO, page 1292-1297. IEEE, (2018)State-of-charge Estimation of Batteries Based on Open-circuit Voltage and Time Series Neural Network., and . ICSAI, page 257-262. IEEE, (2019)