Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Error-Tolerant Algebraic Side-Channel Attacks Using BEE., , , , , and . ICICS, volume 8958 of Lecture Notes in Computer Science, page 1-15. Springer, (2014)Privacy-preserving authentication with low computational overhead for RFID systems., , , and . SecureComm, page 127-132. IEEE, (2007)Anterior Cruciate Ligament Reconstruction Surgery Navigation and Robotic Positioning System Under X-Rays., , , , , and . ROBIO, page 156-163. IEEE, (2018)Further results on permutation trinomials over finite fields with even characteristic., , and . Finite Fields Their Appl., (2017)A New Derivation of Constrained Cramér-Rao Bound Via Norm Minimization., , , and . IEEE Trans. Signal Process., 59 (4): 1879-1882 (2011)Two New Families of Optimal Binary Sequences Obtained From Quaternary Sequences., , , and . IEEE Trans. Inf. Theory, 55 (4): 1833-1840 (2009)基于似物性和空时协方差特征的行人检测算法 (Pedestrian Detection Based on Objectness and Sapce-Time Covariance Features)., , , and . 计算机科学, 45 (6A): 210-214 (2018)基于压缩域编码长度的视频显著性检测 (Video Saliency Detection Based on Compressed Domain Coding Length)., , , and . 计算机科学, 44 (10): 312-317 (2017)Evaluating BEA Systems Application Server Technology, , , and . CSIRO Mathematical and Information Sciences, Macquarie University, Australia, (July 2001)Salient object detection based on discriminative boundary and multiple cues integration., , , , , and . J. Electronic Imaging, 25 (1): 013019 (2016)