Author of the publication

Selective Concealment of Characters for Privacy Protection.

, , , , and . ICPR, page 333-338. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Font Distribution Observation by Network-Based Analysis., , , , , and . CBDAR, volume 8357 of Lecture Notes in Computer Science, page 83-97. Springer, (2013)Analytical Dynamic Programming Tracker., , , and . ACCV (1), volume 6492 of Lecture Notes in Computer Science, page 296-309. Springer, (2010)A Behavior-Based Detection Method for Outbreaks of Low-Rate Attacks., , , and . SAINT, page 267-272. IEEE Computer Society, (2012)A Keypoint-Based Approach toward Scenery Character Detection., , , and . ICDAR, page 819-823. IEEE Computer Society, (2011)On the Possibility of Structure Learning-Based Scene Character Detector., , , and . ICDAR, page 472-476. IEEE Computer Society, (2013)A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation., , , and . AsiaJCIS, page 80-86. IEEE Computer Society, (2016)Analytical Dynamic Programming Matching., , and . ECCV Workshops (1), volume 7583 of Lecture Notes in Computer Science, page 92-101. Springer, (2012)Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding., , and . CANDAR Workshops, page 417-423. IEEE Computer Society, (2018)Scene Character Detection and Recognition with Cooperative Multiple-Hypothesis Framework., , , and . IEICE Trans. Inf. Syst., 96-D (10): 2235-2244 (2013)A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional Network., , , and . SciSec, volume 14299 of Lecture Notes in Computer Science, page 513-523. Springer, (2023)