Author of the publication

Integration of real-time planning and control in an unstructured workspace.

, , , and . IROS, page 1485-1490. IEEE, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Two-Step Approach for Longitudinal Registration of Retinal Images., , , and . J. Medical Syst., 40 (12): 277:1-277:13 (2016)Low-cost and high-efficiency privacy-protection scheme for distributed compressive video sensing in wireless multimedia sensor networks., , , , and . J. Netw. Comput. Appl., (2020)Convolutional neural networks tamper detection and location based on fragile watermarking., , and . Appl. Intell., 53 (20): 24056-24067 (October 2023)Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization., , , , , and . Secur. Commun. Networks, 9 (1): 43-53 (2016)A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing., , and . Secur. Commun. Networks, (2018)Meaningful Image Encryption Based on Reversible Data Hiding in Compressive Sensing Domain., , , , , and . Secur. Commun. Networks, (2018)Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol., , , , , and . Entropy, 21 (5): 518 (2019)GLS coding based security solution to JPEG with the structure of aggregated compression and encryption., , , and . Commun. Nonlinear Sci. Numer. Simul., 19 (5): 1366-1374 (2014)E-commerce supply chain decisions under platform digital empowerment-induced demand., , and . Comput. Ind. Eng., (2020)Three-level quantum image encryption based on Arnold transform and logistic map., , and . Quantum Inf. Process., 20 (1): 23 (2021)