Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Synthetic Aperture Radar Image Segmentation with Reaction Diffusion Level Set Evolution Equation in an Active Contour Model., , , , and . Remote. Sens., 10 (6): 906 (2018)A Non-interactive Secure Outsourced Computation Scheme in Multi-party Cloud., and . INCoS, page 15-19. IEEE, (2012)Cluster-Based Tensorial Semisupervised Discriminant Analysis for Feature Extraction of SAR Images., , , , and . IEEE Access, (2019)Autofeeding System for Assembling the CBCs on Automobile Engine Based on 3-D Vision Guidance., , , , , and . IEEE Trans. Instrum. Meas., (2021)Fully convolutional network with attention modules for semantic segmentation., and . Signal Image Video Process., 15 (5): 1031-1039 (2021)Global Correlative Network for Person re-identification., , , , and . Neurocomputing, (2022)Large language models in bioinformatics: applications and perspectives., , , , , and . CoRR, (2024)Complementary witness soundness for witness indistinguishable proof system and CCA2 public-key encryption schemes., , and . Int. J. Inf. Comput. Secur., 7 (1): 14-38 (2015)Multiple-instance learning via multiple-point concept based instance selection., , , , and . Int. J. Mach. Learn. Cybern., 11 (9): 2113-2126 (2020)Adaptively Secure Constrained Verifiable Random Function., , and . SciSec, volume 14299 of Lecture Notes in Computer Science, page 367-385. Springer, (2023)