Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimating 3D Finger Pose via 2D-3D Fingerprint Matching., , , , and . IUI, page 459-469. ACM, (2022)Current induced anisotropic magnetoresistance in topological insulator films, , , , , , , , , and . (2011)cite arxiv:1108.1465.Security Test Generation Using Threat Trees., , , , and . AST, page 62-69. IEEE Computer Society, (2009)An Attack Scenario Based Approach for Software Security Testing at Design Stage., , and . ISCSCT (1), page 782-787. IEEE Computer Society, (2008)Underwater Multi-Class Targets Classification Based on Conflict Confidence Fusion., , , and . ICSPCC, page 1-6. IEEE, (2021)Visual object tracking via multi-view and group sparse representation., , and . ICCC, page 1-5. IEEE, (2016)FeCaffe: FPGA-enabled Caffe with OpenCL for Deep Learning Training and Inference on Intel Stratix 10., , , , and . FPGA, page 314. ACM, (2020)A Learning-Based Approach to Underwater Direction of Arrival Estimation for Small Samples., , , , and . ICSPCC, page 1-6. IEEE, (2022)WARDEN: Multi-Directional Backdoor Watermarks for Embedding-as-a-Service Copyright Protection., , , and . ACL (1), page 13430-13444. Association for Computational Linguistics, (2024)Partially reconfigurable TVWS transceiver for use in UK and US markets., , , , , , and . ReCoSoC, page 1-6. IEEE, (2012)