Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards human-like and transhuman perception in AI 2.0: a review., , , , , , , , , and 3 other author(s). Frontiers Inf. Technol. Electron. Eng., 18 (1): 58-67 (2017)Session details: Session 2: Short Oral Session.. CEA@ICMR, ACM, (2019)Practical quantum digital signature with configurable decoy states., , , and . Quantum Inf. Process., 19 (5): 151 (2020)Improving the performance of decoy-state quantum digital signature with single-photon-added coherent sources., , , , and . Quantum Inf. Process., 19 (7): 198 (2020)Progressive Visualization of Complex 3D Models Over the Internet., , and . Trans. GIS, 20 (6): 887-902 (2016)Fast Construction of Global Pyramids for Very Large Satellite Images., , , and . Trans. GIS, 17 (2): 282-297 (2013)Changes in monthly flows in the Yangtze River, China – With special reference to the Three Gorges Dam, , , , , , and . Journal of Hydrology, (May 2016)The visual analysis of flow pattern for public bicycle system., , , , and . J. Vis. Lang. Comput., (2018)Multiple description coding for multi-view video with adaptive redundancy allocation., , , and . ISPACS, page 181-185. IEEE, (2017)Effectiveness of a phishing warning in field settings., , , , and . HotSoS, page 14:1-14:2. ACM, (2015)