Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New S/Key System against Dictionary Attack: A Case Study in Casper and CSP/FDR., and . VVEIS, page 75-77. INSTICC Press, (2004)Adaptive nonlinear equalizer with reduced computational complexity, , and . Signal Processing, 47 (3): 307--317 (December 1995)Knowledge Distillation with Adversarial Samples Supporting Decision Boundary., , , and . AAAI, page 3771-3778. AAAI Press, (2019)Gaussian Mixture Proposals with Pull-Push Learning Scheme to Capture Diverse Events for Weakly Supervised Temporal Video Grounding., , , , and . AAAI, page 2795-2803. AAAI Press, (2024)Is a False Positive really False Positive?, , and . ICACT, page 145-149. IEEE, (2021)Is a False Positive really False Positive?, , and . ICACT, page 145-149. IEEE, (2022)RFID Privacy Protection Scheme for Secure Ubiquitous Computing., , and . IWRT, page 117-124. INSTICC PRESS, (2007)Density-Aware Pedestrian Proposal Networks for Robust People Detection in Crowded Scenes., , , and . ECCV Workshops (2), volume 9914 of Lecture Notes in Computer Science, page 643-654. (2016)Automatic Visual Data Management System., , , and . ICEC, volume 3166 of Lecture Notes in Computer Science, page 579-585. Springer, (2004)Robust and fast moving object detection in a non-stationary camera via foreground probability based sampling., and . ICIP, page 4897-4901. IEEE, (2015)