Author of the publication

Mean shift tracker combined with online learning-based detector and Kalman filtering for real-time tracking.

, , and . Expert Syst. Appl., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mean shift tracker combined with online learning-based detector and Kalman filtering for real-time tracking., , and . Expert Syst. Appl., (2017)Extended Authentication Integrating Scheme for Beyond 3G Wireless Networks., , and . ISCIS, volume 4263 of Lecture Notes in Computer Science, page 413-423. Springer, (2006)A practical security framework for a VANET-based entertainment service., , and . PM2HW2N@MSWiM, page 175-182. ACM, (2009)4.3 A 43mm2 Fully Integrated Legacy Cellular and 5G FR1 RF Transceiver with 24RX/3TX Supporting Inter-Band 7CA/5CA 4×4 MIMO with 1K-QAM., , , , , , , , , and 26 other author(s). ISSCC, page 80-82. IEEE, (2024)Password typographical error resilience in honey encryption., , , , and . Comput. Secur., (2019)Host-oblivious security for content-based networks., , and . CFI, page 35-40. ACM, (2010)Security Analysis of Multi-path Routing Scheme in Ad Hoc Networks., and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 694-697. Springer, (2004)Predeployed secure key distribution mechanisms in sensor networks: current state-of-the-art and a new approach using time information., and . IEEE Wirel. Commun., 15 (4): 42-51 (2008)ECAP-YOLO: Efficient Channel Attention Pyramid YOLO for Small Object Detection in Aerial Image., , and . Remote. Sens., 13 (23): 4851 (2021)Prevention of Black-Hole Attack using One-Way Hash Chain Scheme in Ad-Hoc Networks., , and . ICOIN, volume 5200 of Lecture Notes in Computer Science, page 564-573. Springer, (2007)