Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nest Detection Using Coarse-to-Fine Searching Strategy., , , , and . IFTC, volume 815 of Communications in Computer and Information Science, page 503-512. Springer, (2017)Real Time Compressed Video Object Segmentation., , , and . ICME, page 628-633. IEEE, (2019)Cascaded Residual Density Network for Crowd Counting., , , , and . ICIP, page 2199-2203. IEEE, (2019)Real Time Video Object Segmentation in Compressed Domain., , , , , , and . IEEE Trans. Circuits Syst. Video Technol., 31 (1): 175-188 (2021)A New Blind Attack Procedure for DCT-Based Image Encryption with Spectrum Learning., and . Int. J. Image Graph., 7 (3): 481-496 (2007)ATDD: Fine-Grained Assured Time-Sensitive Data Deletion Scheme in Cloud Storage., , , and . ICC, page 3448-3453. IEEE, (2022)Towards More Powerful Multi-column Convolutional Network for Crowd Counting., , , , , and . ICIG (1), volume 12888 of Lecture Notes in Computer Science, page 381-392. Springer, (2021)Breaking row-column shuffle based image cipher., , and . ACM Multimedia, page 1097-1100. ACM, (2012)Improving Security of an Image Encryption Algorithm based on Chaotic Circular Shift., and . SMC, page 3694-3698. IEEE, (2009)Sub-channel and Power Allocation for Multiuser OFDM Systems with Proportional Rate Constraints Based on Genetic Algorithms., , and . ICoC, volume 401 of Communications in Computer and Information Science, page 31-39. Springer, (2013)