Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

3D Object Reconstruction using Line and Point Feature Matching., , , and . Computer Graphics and Imaging, page 171-176. IASTED/ACTA Press, (2005)A new encryption and decryption algorithm for privacy data in wireless sensor network based on dynamic key., and . Int. J. Auton. Adapt. Commun. Syst., 16 (4): 376-390 (2023)Real time detection of intrusion trace information in sensor network based on Bayesian belief network., and . Int. J. Auton. Adapt. Commun. Syst., 16 (1): 48-65 (2023)Virtual Inductive Loop: Real time video analytics for vehicular access control., , , , , , , , , and 4 other author(s). AVSS, page 1-8. IEEE, (2021)A Novel Approach for Signal Transduction Networks Simulation at a Mesoscopic Level., and . BIBE, page 487-494. IEEE Computer Society, (2007)Sichuan dialect speech recognition with deep LSTM network., , and . Frontiers Comput. Sci., 14 (2): 378-387 (2020)Performance evaluation of an intelligent video surveillance system - A case study., and . Comput. Vis. Image Underst., 114 (11): 1292-1302 (2010)Network Intrusion Detection Based on Sparse Autoencoder and IGA-BP Network., and . Wirel. Commun. Mob. Comput., (2021)Reinforcement Matching Using Region Context., , , and . CVPR Workshops, page 11. IEEE Computer Society, (2006)Understanding visual dictionaries via Maximum Mutual Information curves., and . ICPR, page 1-4. IEEE Computer Society, (2008)