Author of the publication

Analysis on AACS' Traitor Tracing Against Mix-and-Match Attacks.

, , , and . CCNC, page 1097-1101. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis., , , and . IACR Cryptol. ePrint Arch., (2005)Action recognition based on adaptive region perception., , , and . Neural Comput. Appl., 36 (2): 943-959 (January 2024)AaDR-PointCloud: An integrated point cloud processing network using attention and deep residual., , and . J. Intell. Fuzzy Syst., 46 (3): 6265-6277 (March 2024)Investigation of Long-Term Forest Dynamics in Protected Areas of Northeast China Using Landsat Data., , , , , , and . Remote. Sens., 14 (13): 2988 (2022)Dadu-SV: Accelerate Stereo Vision Processing on NPU., , , , , , , and . IEEE Embed. Syst. Lett., 14 (4): 191-194 (2022)LIVE: Learning and Inference for Virtual Network Embedding., , , , and . J. Netw. Syst. Manag., 24 (2): 227-256 (2016)Very Rapid Forest Cover Change in Sichuan Province, China: 40 Years of Change Using Images From Declassified Spy Satellites and Landsat., , , , , , , , , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., (2021)An Advanced Automated Image Analysis Model for Scoring of ER, PR, HER-2 and Ki-67 in Breast Carcinoma., , , , , , , , and . IEEE Access, (2021)Optimal identifying codes of two families of Cayley graphs., , and . Discret. Appl. Math., (2022)Offline Handwritten Chinese Character Recognition Based on Improved Googlenet., , and . AIPR, page 42-46. ACM, (2020)