Author of the publication

Augmented Privacy with Virtual Humans.

, , , , and . Digital Human Modeling, volume 4650 of Lecture Notes in Computer Science, Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research and Implementation of the Uniform Authentication Based on Web Service., , , and . ICAIC (1), volume 224 of Communications in Computer and Information Science, page 87-92. Springer, (2011)Video intelligence workshop (VI-2010).. ICCS, volume 1 of Procedia Computer Science, page 2509. Elsevier, (2010)Traffic camera markup language (TCML)., , and . Visual Information Processing and Communication, volume 8305 of SPIE Proceedings, page 830510. SPIE, (2012)Place Your Next Branch with MILE-RUN: Min-dist Location Selection over User Movement., , , and . Inf. Sci., (2018)Interactive Visualization of Network Anomalous Events., and . ICCS (1), volume 5544 of Lecture Notes in Computer Science, page 450-459. Springer, (2009)A Privacy Algorithm for 3D Human Body Scans., and . International Conference on Computational Science (4), volume 3994 of Lecture Notes in Computer Science, page 870-877. Springer, (2006)Visual analysis of human dynamics: an introduction to the special issue., and . Inf. Vis., 5 (4): 235-236 (2006)Video-based image retrieval., , , , and . ACM Multimedia, page 1001-1004. ACM, (2011)Voronoi Centerline-Based Seamline Network Generation Method., , and . Remote. Sens., 15 (4): 917 (February 2023)A Single-Layer Reflect-Transmit-Array Antenna With Polarization-Dependent Operation., , , , , , and . IEEE Access, (2021)