Author of the publication

Object recognition using rotation invariant local binary pattern of significant bit planes.

, , , and . IET Image Processing, 10 (9): 662-670 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recursive Spectral Meta-Learner for Online Combining Different Fault Classifiers., and . IEEE Trans. Automat. Contr., 63 (2): 586-593 (2018)Saliency modeling via outlier detection., , , , , and . J. Electronic Imaging, 23 (5): 053023 (2014)Early Classification of Industrial Alarm Floods Based on Semisupervised Learning., , and . IEEE Trans. Ind. Informatics, 18 (3): 1845-1853 (2022)Optimal DoS Attack Against LQR Control Channels., , , and . IEEE Trans. Circuits Syst. II Express Briefs, 68 (4): 1348-1352 (2021)Integrity attacks on remote estimation with spatial-temporal information sources., , , , and . Autom., (September 2023)Optimal deception attacks on remote state estimators equipped with interval anomaly detectors., , and . Autom., (February 2023)Nonstationary Process Monitoring for Blast Furnaces Based on Consistent Trend Feature Analysis., , , and . IEEE Trans. Control. Syst. Technol., 30 (3): 1257-1267 (2022)Cybersecurity Landscape on Remote State Estimation: A Comprehensive Review., , and . IEEE CAA J. Autom. Sinica, 11 (4): 851-865 (April 2024)Optimal Linear FDI Attacks with Side Information: A Comparative Study., , and . ICPS, page 138-143. IEEE, (2021)Finite-Horizon Strictly Stealthy Deterministic Attacks on Cyber-Physical Systems., , and . IEEE Control. Syst. Lett., (2022)