Author of the publication

Human motion recognition based on SVM in VR art media interaction environment.

, , , , and . Hum. centric Comput. Inf. Sci., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Mining of High Average-Utility Itemsets with Multiple Thresholds., , and . IIH-MSP (1), volume 81 of Smart Innovation, Systems and Technologies, page 198-205. Springer, (2017)A New Certificate-Based Aggregate Signature Scheme for Wireless Sensor Networks., , , and . J. Inf. Hiding Multim. Signal Process., 9 (5): 1264-1280 (2018)A Parse Tree-Based NoSQL Injection Attacks Detection Mechanism., , , , and . J. Inf. Hiding Multim. Signal Process., 8 (4): 916-928 (2017)Transfer learning model for false positive reduction in lymph node detection via sparse coding and deep learning., , and . J. Intell. Fuzzy Syst., 43 (2): 2121-2133 (2022)Improvement on a Chaotic Map-based Mutual Anonymous Authentication Protocol., , , , , and . J. Inf. Sci. Eng., 34 (2): 371-390 (2018)An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks., , , , , and . IEEE Access, (2020)Application of Quantum Genetic Optimization of LVQ Neural Network in Smart City Traffic Network Prediction., , , , , , and . IEEE Access, (2020)SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing., , , , and . Symmetry, 14 (7): 1393 (2022)Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique., and . Informatica, 21 (2): 247-258 (2010)A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps., , and . IEEE Access, (2018)