Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Adaptive Attention Triple Hashing., , , , and . MMAsia, page 78:1-78:5. ACM, (2021)Implementation of Gray Projection Image Stabilization Algorithm Based on TMS320DM642., , , , and . NCM, page 1724-1726. IEEE Computer Society, (2009)A Survey of the Development of Wearable Devices., , , , and . ICARM, page 198-203. IEEE, (2020)Capillary self-alignment assisted hybrid robotic handling for ultra-thin die stacking., , , , and . ICRA, page 1403-1408. IEEE, (2013)A Generalized Predictive Control-Based Path Following Method for Parafoil Systems in Wind Environments., , , and . IEEE Access, (2019)Splitting Third-Party Libraries' Privileges from Android Apps., , , , and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 80-94. Springer, (2017)Environmental influences on microassembly., , , , and . IROS, page 1760-1765. IEEE, (2002)A Shapley value based method for allocating carbon obligation between generation side and demand side in power system., , , and . IECON, page 56-60. IEEE, (2017)A Measurement Study on Linux Container Security: Attacks and Countermeasures., , , , , and . ACSAC, page 418-429. ACM, (2018)Balanced Multiwavelets Based Digital Image Watermarking., , , and . IWDW, volume 5450 of Lecture Notes in Computer Science, page 350-362. Springer, (2008)