Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Certificate-based Fair Exchange Protocol of Schnorr Signatures in Chosen-key Model., and . Fundam. Informaticae, 141 (1): 95-114 (2015)Real-Time Multi-scale Tracking via Online RGB-D Multiple Instance Learning., , , and . J. Softw., 10 (11): 1235-1244 (2015)DilateFormer: Multi-Scale Dilated Transformer for Visual Recognition., , , , , , and . CoRR, (2023)Extended Research on the Security of Visual Reasoning CAPTCHA., , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (6): 4976-4992 (November 2023)Space-correlated Contrastive Representation Learning with Multiple Instances., , , , and . ICPR, page 4715-4721. IEEE, (2022)Practical verifiably encrypted signatures based on discrete logarithms., and . Secur. Commun. Networks, 9 (18): 5996-6003 (2016)Self-supervised Cross-stage Regional Contrastive Learning for Object Detection., , , and . ICME, page 1044-1049. IEEE, (2023)DilateFormer: Multi-Scale Dilated Transformer for Visual Recognition., , , , , , and . IEEE Trans. Multim., (2023)MixCon3D: Synergizing Multi-View and Cross-Modal Contrastive Learning for Enhancing 3D Representation., , , , and . CoRR, (2023)Research on the Security of Visual Reasoning CAPTCHA., , , , , , , , and . USENIX Security Symposium, page 3291-3308. USENIX Association, (2021)