Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multistage identification method for real-time abnormal events of streaming data., , , , , and . IJDSN, (2019)Android多窗口系统的研究、设计与实现 (Research, Design and Implementation of Android Multi-window System)., , , and . 计算机科学, 44 (11): 120-124 (2017)A Tree-Structured Deterministic Small-World Network., , , , and . IEICE Trans. Inf. Syst., 95-D (5): 1536-1538 (2012)Improved Histogram Shifting Technique for Low Payload Embedding by Using a Rate-Distortion Model and Optimal Side Information Selection., , , and . IEICE Trans. Inf. Syst., 95-D (10): 2552-2555 (2012)Erasable Photograph Tagging: A Mobile Application Framework Employing Owner's Voice., , , , and . IEICE Trans. Inf. Syst., 97-D (2): 370-372 (2014)Global Motion Representation of Video Shot Based on Vector Quantization Index Histogram., , , and . IEICE Trans. Inf. Syst., 92-D (1): 90-92 (2009)Real-Time Implementation of Fault-Tolerant Control Systems With Performance Optimization., , and . IEEE Trans. Ind. Electron., 61 (5): 2402-2411 (2014)Multiple Watermarking in Visual Cryptography., , and . IWDW, volume 5041 of Lecture Notes in Computer Science, page 60-70. Springer, (2007)Counterfactual-based minority oversampling for imbalanced classification., and . CoRR, (2020)Locality analysis: a nonillion time window problem., , and . SIGMETRICS Perform. Evaluation Rev., 41 (4): 102-105 (2014)