Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Abusing Public Third-Party Services for EDoS Attacks., , , and . WOOT, USENIX Association, (2016)Super Compaction and Pluripotent Shape Transformation via Algorithmic Stacking for 3D Deployable Structures., , , , , , , , and . CoRR, (2018)Origami-based Zygote structure enables pluripotent shape-transforming deployable structure., , , , , , , and . CoRR, (2022)Folding and unfolding origami tessellation by reusing folding path., and . ICRA, page 4155-4160. IEEE, (2015)WebTrap: A dynamic defense scheme against economic denial of sustainability attacks., , , and . CNS, page 1-9. IEEE, (2017)Learning to segment and unfold polyhedral mesh from failures., , , and . Comput. Graph., (2016)An empirical study of financial incentivized question answering in social websites., , , and . HotWeb, page 2:1-2:6. ACM, (2017)Collision prediction among polygons with arbitrary shape and unknown motion., , and . IROS, page 4148-4153. IEEE, (2014)Disjoint convex shell and its applications in mesh unfolding., , and . Comput. Aided Des., (2017)AVA-Speech: A Densely Labeled Dataset of Speech Activity in Movies., , , , , , , , , and 1 other author(s). INTERSPEECH, page 1239-1243. ISCA, (2018)