Author of the publication

The Sixth Visual Object Tracking VOT2018 Challenge Results.

, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and . ECCV Workshops (1), volume 11129 of Lecture Notes in Computer Science, page 3-53. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessing Security in Energy-Efficient Sensor Networks., , and . SEC, volume 250 of IFIP Conference Proceedings, page 459-463. Kluwer, (2003)Dynamic tunnel routing for reliable and resilient data forwarding in wireless sensor networks., , and . PIMRC, page 1178-1182. IEEE, (2009)Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols., , , , and . SASN, page 76-88. ACM, (2005)Security Games and Risk Minimization for Automatic Generation Control in Smart Grid., , , and . GameSec, volume 7638 of Lecture Notes in Computer Science, page 281-295. Springer, (2012)UAV-GESTURE: A Dataset for UAV Control and Gesture Recognition., , and . CoRR, (2019)A Multiviewpoint Outdoor Dataset for Human Action Recognition., , , and . IEEE Trans. Hum. Mach. Syst., 50 (5): 405-413 (2020)Exploiting similar prior knowledge for compressing ECG signals., , , and . Biomed. Signal Process. Control., (2020)Privacy-Preserving Collaborative Deep Learning with Application to Human Activity Recognition., , , and . CIKM, page 1219-1228. ACM, (2017)Insider DoS Attacks on Epidemic Propagation Strategies of Network Reprogramming in Wireless Sensor Networks., , , and . IAS, page 263-266. IEEE Computer Society, (2009)KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks., , , and . Inscrypt, volume 6584 of Lecture Notes in Computer Science, page 268-283. Springer, (2010)