Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Robust Registration and Detection Method for Color Seal Verification., and . ICIC (1), volume 3644 of Lecture Notes in Computer Science, page 97-106. Springer, (2005)Robust 3D Face Recognition by Using Shape Filtering., and . BMVC, page 1-11. British Machine Vision Association, (2010)基于空样式的网页水印方法 (New Method for Webpage Watermarking Based on Empty Styles)., , , and . 计算机科学, 45 (11A): 338-341 (2018)Blockchain in China., , , , and . Commun. ACM, 64 (11): 88-93 (2021)TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion., and . HotSec, USENIX Association, (2011)Description of Configuration Transformation Matrix of Reconfigurable Mechanism and Automatic Retrieval and Recognition of Motion Mode., , and . ICIRA (9), volume 14275 of Lecture Notes in Computer Science, page 110-123. Springer, (2023)Application of Adaptive Sub-band Filters on Active Noise Control., , , and . SPML, page 106-111. ACM, (2022)On the Practicality of Motion Based Keystroke Inference Attack., and . TRUST, volume 7344 of Lecture Notes in Computer Science, page 273-290. Springer, (2012)ESM2-Tree: An maintenance efficient authentication data structure in blockchain., , , , and . SSDBM, page 7:1-7:12. ACM, (2023)Time-series interval prediction under uncertainty using modified double multiplicative neuron network., , , , and . Expert Syst. Appl., (2021)