Author of the publication

Effective Key Region-Guided Face Detail Optimization Algorithm for 3D Face Reconstruction.

, , , , and . J. Sensors, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Analysis and Verification for Three-Party Authentication Protocol of RFID., , , , and . NCTCS, volume 882 of Communications in Computer and Information Science, page 46-60. Springer, (2018)Deriving Security Protocols Based on Protocol Derivation System., , , and . NCTCS, volume 1352 of Communications in Computer and Information Science, page 172-184. Springer, (2020)Formal automatic verification of security protocols., and . GrC, page 566-569. IEEE, (2006)Modeling and Verification of WPA3 Security Protocol Based on SPIN., , , , , and . NCTCS, volume 1944 of Communications in Computer and Information Science, page 248-265. Springer, (2023)基于SPIN的Andrew Secure RPC协议并行攻击模型检测 (Model Checking of Parallel Attack in Andrew Secure RPC Protocol Based on SPIN)., , and . 计算机科学, 42 (7): 103-107 (2015)Exploiting abstract change pattern from code changes., , , , and . J. Intell. Fuzzy Syst., 35 (2): 1597-1608 (2018)Proving authentication property of PUF-based mutual authentication protocol based on logic of events., , , and . Soft Comput., 26 (2): 841-852 (2022)Proving Mutual Authentication Property of 5G-AKA Protocol Based on PCL., , and . NCTCS, volume 1494 of Communications in Computer and Information Science, page 222-233. Springer, (2021)Effective Key Region-Guided Face Detail Optimization Algorithm for 3D Face Reconstruction., , , , and . J. Sensors, (2022)Security Proof of KerNeeS Protocol Based on Logic of Events., , and . NCTCS, volume 882 of Communications in Computer and Information Science, page 61-79. Springer, (2018)