Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MAGR: Manifold-Aligned Graph Regularization for Continual Action Quality Assessment., , , , , , and . CoRR, (2024)HyperSDFusion: Bridging Hierarchical Structures in Language and Geometry for Enhanced 3D Text2Shape Generation., , , and . CoRR, (2024)Modeling Large Scale Clouds from Satellite Images., , , and . PG (Short Papers), Eurographics Association, (2013)HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks., , , , and . Comput. Commun., 35 (15): 1910-1920 (2012)A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs., , , and . IEEE Trans. Intell. Transp. Syst., 13 (1): 127-139 (2012)EPIC: Efficient Privacy-Preserving Contact Tracing for Infection Detection., , and . ICC, page 1-6. IEEE, (2018)Demo: Wanda, Securely Introducing Mobile Devices., , , and . MobiSys (Companion Volume), page 113. ACM, (2016)Multi-Scale Dual-Branch Fully Convolutional Network for Hand Parsing., , and . CoRR, (2019)Provably secure and efficient bounded ciphertext policy attribute based encryption., , , and . AsiaCCS, page 343-352. ACM, (2009)Exploiting Physical Presence Sensing to Secure Voice Assistant Systems., , , and . ICC, page 1-6. IEEE, (2021)