Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Object Recognition Strategy Base upon Foreground Detection., , , and . AICI (3), volume 7004 of Lecture Notes in Computer Science, page 39-46. Springer, (2011)Research and Implementation of License Plate Character Segmentation Based on Tilt Correction., , , and . ISIA, volume 86 of Communications in Computer and Information Science, page 92-97. Springer, (2010)Efficient Implementation of Tate Pairing with Montgomery Ladder Method., , and . INCoS, page 398-402. IEEE, (2013)Niche Genetic Algorithm Based on Sexual Reproduction and Multimodal Function Optimization Problem., , , , and . Int. J. Adv. Pervasive Ubiquitous Comput., 3 (1): 7-15 (2011)Integrating real-time and batch processing in a polystore., , , , , , and . HPEC, page 1-7. IEEE, (2016)Exploiting Adversarial Examples to Drain Computational Resources on Mobile Deep Learning Systems., , , , , and . SEC, page 334-339. IEEE, (2020)MobiCrowd: Mobile Crowdsourcing on Location-based Social Networks., , , , and . INFOCOM, page 2726-2734. IEEE, (2018)Trojan Attack on Deep Generative Models in Autonomous Driving., , , , and . SecureComm (1), volume 304 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 299-318. Springer, (2019)Stealthy Backdoors as Compression Artifacts., , , and . CoRR, (2021)Simulation of Tumor Detection Based on Bioelectrical Impedance Measurement., , , , and . ISIA, volume 86 of Communications in Computer and Information Science, page 98-104. Springer, (2010)