Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure data hiding in binary document images for authentication., , and . ISCAS (3), page 806-809. IEEE, (2003)Realtime and robust object matching with a large number of templates., , , , and . Multimedia Tools Appl., 75 (3): 1459-1480 (2016)Low-complexity coding scheme to approach multiple-access channel capacity., and . ISIT, page 2106-2110. IEEE, (2015)Multi-objective drilling trajectory optimization based on NSGA-II., , , , , , and . ASCC, page 1234-1239. IEEE, (2017)Objective Distortion Measure for Binary Text Image Based on Edge Line Segment Similarity., and . IEEE Trans. Image Processing, 16 (6): 1691-1695 (2007)The research of government collaboration patterns based on the government information resource interchange framework., , and . ICEGOV, volume 322 of ACM International Conference Proceeding Series, page 51-56. ACM, (2009)Robust finite-time stabilization for positive delayed semi-Markovian switching systems., , , and . Appl. Math. Comput., (2019)Reinforcement online learning for emotion prediction by using physiological signals., , , and . Pattern Recognit. Lett., (2018)Online learning using projections onto shrinkage closed balls for adaptive brain-computer interface., , and . Pattern Recognit., (2020)Data-driven facial animation via semi-supervised local patch alignment., , , , , and . Pattern Recognit., (2016)