Sheng Zhong

According to our database1, Sheng Zhong authored at least 184 papers between 1993 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Security and Privacy for Next-Generation Wireless Networks
Wireless Networks, Springer, ISBN: 978-3-030-01149-9, 2019

HSI-DeNet: Hyperspectral Image Restoration via Convolutional Neural Network.
IEEE Trans. Geoscience and Remote Sensing, 2019

Infrared Aerothermal Nonuniform Correction via Deep Multiscale Residual Network.
IEEE Geosci. Remote Sensing Lett., 2019

Securing peer-assisted indoor localization leveraging acoustic ranging.
Computers & Security, 2019

On repeated stackelberg security game with the cooperative human behavior model for wildlife protection.
Appl. Intell., 2019

2018
A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries.
IEEE Trans. Information Forensics and Security, 2018

Motion Correlation Discovery for Visual Tracking.
IEEE Signal Process. Lett., 2018

Privacy-preserving face detection based on linear and nonlinear kernels.
Multimedia Tools Appl., 2018

GITAR: An Open Source Tool for Analysis and Visualization of Hi-C Data.
Genomics, Proteomics & Bioinformatics, 2018

Location privacy in public access points positioning: An optimization and geometry approach.
Computers & Security, 2018

Topology-Preserving Traffic Engineering for Hierarchical Multi-Domain SDN.
Computer Networks, 2018

On comparison of modified ADRCs for nonlinear uncertain systems with time delay.
SCIENCE CHINA Information Sciences, 2018

Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt.
IEEE Access, 2018

MobiCrowd: Mobile Crowdsourcing on Location-based Social Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Accurate and Efficient Wireless Device Fingerprinting Using Channel State Information.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Learning from Differentially Private Neural Activations with Edge Computing.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

2017
A Jointly Differentially Private Scheduling Protocol for Ridesharing Services.
IEEE Trans. Information Forensics and Security, 2017

Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing.
IEEE Trans. Information Forensics and Security, 2017

We Can Track You if You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones.
IEEE Trans. Information Forensics and Security, 2017

Efficient and Privacy-Preserving Min and kth Min Computations in Mobile Sensing Systems.
IEEE Trans. Dependable Sec. Comput., 2017

Robust Object Tracking Based on Self-adaptive Search Area.
CoRR, 2017

Discussion among Different Methods of Updating Model Filter in Object Tracking.
CoRR, 2017

Weighted Low-rank Tensor Recovery for Hyperspectral Image Restoration.
CoRR, 2017

Hyperspectral image denoising via spectral and spatial low-rank approximation.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

Transformed Low-Rank Model for Line Pattern Noise Removal.
Proceedings of the IEEE International Conference on Computer Vision, 2017

Incentive Mechanism Design in Mobile Crowd Sensing Systems with Budget Restriction and Capacity Limit.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Hyper-Laplacian Regularized Unidirectional Low-Rank Tensor Recovery for Multispectral Image Denoising.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition, 2017

On Repeated Stackelberg Security Game with the Cooperative Human Behavior Modelfor Wildlife Protection.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

2016
Designing Secure and Dependable Mobile Sensing Mechanisms With Revenue Guarantees.
IEEE Trans. Information Forensics and Security, 2016

On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for k-Anonymity Location Privacy.
IEEE Trans. Information Forensics and Security, 2016

Privacy-Preserving Data Aggregation in Mobile Phone Sensing.
IEEE Trans. Information Forensics and Security, 2016

A Unified Resource Allocation Framework for Defending Against Pollution Attacks in Wireless Network Coding Systems.
IEEE Trans. Information Forensics and Security, 2016

Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially Private Mechanisms.
IEEE Trans. Information Forensics and Security, 2016

Remote Sensing Image Stripe Noise Removal: From Image Decomposition Perspective.
IEEE Trans. Geoscience and Remote Sensing, 2016

GeNemo: a search engine for web-based functional genomic data.
Nucleic Acids Research, 2016

Joint Differentially Private Gale-Shapley Mechanisms for Location Privacy Protection in Mobile Traffic Offloading Systems.
IEEE Journal on Selected Areas in Communications, 2016

EV-Linker: Mapping eavesdropped Wi-Fi packets to individuals via electronic and visual signal matching.
J. Comput. Syst. Sci., 2016

Secure Keyboards Against Motion Based Keystroke Inference Attack.
Proceedings of the Security and Privacy in Communication Networks, 2016

Competitive auctions for cost-aware cellular traffic offloading with optimized capacity gain.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

FOUM: A flow-ordered consistent update mechanism for software-defined networking in adversarial settings.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Garlic Cast: Lightweight and Decentralized Anonymous Content Sharing.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Instant and Robust Authentication and Key Agreement among Mobile Devices.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
MICOR: A Market for Incentive-Compatible Cooperative Relay in Cognitive Radio Networks.
IEEE Trans. Vehicular Technology, 2015

Wormhole Attack Detection Algorithms in Wireless Network Coding Systems.
IEEE Trans. Mob. Comput., 2015

Joint Resource Allocation for Device-to-Device Communications Underlaying Uplink MIMO Cellular Networks.
IEEE Journal on Selected Areas in Communications, 2015

Privacy-preserving Network Functionality Outsourcing.
CoRR, 2015

We Can Track You If You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones.
CoRR, 2015

Privacy-preserving Cross-domain Routing Optimization - A Cryptographic Approach.
CoRR, 2015

Cheating Detection for Payment Based Incentives with Application to Network Coding.
Ad Hoc & Sensor Wireless Networks, 2015

A Risk Control Technology towards Supply Chain Finance in Banking Industry.
Proceedings of the International Conference on Service Science, 2015

Protecting Location Information in Collaborative Sensing of Cognitive Radio Networks.
Proceedings of the 18th ACM International Conference on Modeling, 2015

An Incentive Scheme for Packet Forwarding and Payment Reduction in Wireless Ad-hoc Networks Using XOR Network Coding.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

Traffic engineering in hierarchical SDN control plane.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Message from the IPCCC 2015 general chairs.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Differentially private publication of general time-serial trajectory data.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Differentially Private Matrix Factorization.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Foodservice Management of Health Industries Based on Customer Satisfaction.
Proceedings of the Advances in Production Management Systems: Innovative Production Management Towards Sustainable Growth, 2015

Privacy Preserving Market Schemes for Mobile Sensing.
Proceedings of the 44th International Conference on Parallel Processing, 2015

Privacy-Preserving Cross-Domain Routing Optimization - A Cryptographic Approach.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

Advertiser and Publisher-centric Privacy Aware Online Behavioral Advertising.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Resource allocation in pollution attack and defense: A game-theoretic perspective.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Towards Attack-Resistant Peer-Assisted Indoor Localization.
Proceedings of the Computer Security - ESORICS 2015, 2015

Incentive Mechanism Design for Smartphone Crowdsensing.
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015

2014
Truthful Auctions for Continuous Spectrum with Variable Bandwidths.
IEEE Trans. Wireless Communications, 2014

An Enforceable Scheme for Packet Forwarding Cooperation in Network-Coding Wireless Networks With Opportunistic Routing.
IEEE Trans. Vehicular Technology, 2014

Towards Cheat-Proof Cooperative Relayfor Cognitive Radio Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

An Embedded System-on-Chip Architecture for Real-time Visual Detection and Matching.
IEEE Trans. Circuits Syst. Video Techn., 2014

Toward Wireless Security without Computational Assumptions - Oblivious Transfer Based on Wireless Channel Characteristics.
IEEE Trans. Computers, 2014

Horizontal velocity estimation via downward looking descent images for lunar landing.
IEEE Trans. Aerospace and Electronic Systems, 2014

Symbol Timing Estimation with Multi-h CPM Signals.
JNW, 2014

Privacy preserving growing neural gas over arbitrarily partitioned data.
Neurocomputing, 2014

Approximate Capacities of Two-Dimensional Codes by Spatial Mixing.
CoRR, 2014

Belief propagation for spatial spectrum access games.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Approximate capacities of two-dimensional codes by spatial mixing.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

A multimodal investigation of in vivo muscle behavior: System design and data analysis.
Proceedings of the IEEE International Symposium on Circuits and Systemss, 2014

DAWN: Defending against wormhole attacks in wireless network coding systems.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

A preliminary study of in vivo muscle behavior during walking among hemiplegia patients.
Proceedings of the 19th International Conference on Digital Signal Processing, 2014

A novel outlier detection method for identifying torque-related transient patterns of in vivo muscle behavior.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

Privacy Preserving Calculation of Fisher Criterion Score for Informative Gene Selection.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Bioengineering, 2014

2013
How to Select Optimal Gateway in Multi-Domain Wireless Networks: Alternative Solutions without Learning.
IEEE Trans. Wireless Communications, 2013

A Game-Theoretic Approach to Stimulate Cooperation for Probabilistic Routing in Opportunistic Networks.
IEEE Trans. Wireless Communications, 2013

On Designing Protocols for Noncooperative, Multiradio Channel Assignment in Multiple Collision Domains.
IEEE Trans. Computers, 2013

Understanding Variation in Transcription Factor Binding by Modeling Transcription Factor Genome-Epigenome Interactions.
PLoS Computational Biology, 2013

A privacy-preserving algorithm for distributed training of neural network ensembles.
Neural Computing and Applications, 2013

Privacy preserving perceptron learning in malicious model.
Neural Computing and Applications, 2013

A real-time embedded architecture for SIFT.
Journal of Systems Architecture - Embedded Systems Design, 2013

Privacy-preserving Kruskal-Wallis test.
Computer Methods and Programs in Biomedicine, 2013

Enabling interspecies epigenomic comparison with CEpBrowser.
Bioinformatics, 2013

An improved differential evolution algorithm based on the Sector Window Floating Zoom Immune Random Search operator.
Proceedings of the Ninth International Conference on Natural Computation, 2013

On designing truthful spectrum auctions for variable bandwidths.
Proceedings of IEEE International Conference on Communications, 2013

A Privacy Preserving Markov Model for Sequence Classification.
Proceedings of the ACM Conference on Bioinformatics, 2013

Noninvasive assessment of liver viscoelasticity by acoustic radiation force with a rat model.
Proceedings of the 9th International Conference on Information, 2013

2012
Protecting data privacy in growing neural gas.
Neural Computing and Applications, 2012

Emergency Access Authorization for Personally Controlled Online Health Care Data.
J. Medical Systems, 2012

A bargaining-based approach for incentive-compatible message forwarding in opportunistic networks.
Proceedings of IEEE International Conference on Communications, 2012

Scorpio: A Simple, Convenient, Microsoft Excel Macro Based Program for Privacy-Preserving Logrank Test.
Proceedings of the Computer Applications for Database, Education, and Ubiquitous Computing, 2012

2011
Stimulating Cooperation in Vehicular Ad Hoc Networks: A Coalitional Game Theoretic Approach.
IEEE Trans. Vehicular Technology, 2011

A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability.
IEEE Trans. Knowl. Data Eng., 2011

FITS: A Finite-Time Reputation System for Cooperation in Wireless Ad Hoc Networks.
IEEE Trans. Computers, 2011

Towards an Evolutionary Model of Transcription Networks.
PLoS Computational Biology, 2011

Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data.
Neural Computing and Applications, 2011

Approximation algorithm for estimating failure probability of multipath transmission.
Mathematics and Computers in Simulation, 2011

A reputation system for wireless mesh networks using network coding.
J. Network and Computer Applications, 2011

An efficient identity-based protocol for private matching.
Int. J. Communication Systems, 2011

High-precision localisation algorithm in wireless sensor networks.
IJCAT, 2011

Privacy-preserving models for comparing survival curves using the logrank test.
Computer Methods and Programs in Biomedicine, 2011

Mapping personal functional data to personal genomes.
Bioinformatics, 2011

Towards cheat-proof cooperative relay for cognitive radio networks.
Proceedings of the 12th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2011

Towards wireless security without computational assumptions - An oblivious transfer protocol based on an unauthenticated wireless channel.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Co-op Advertising Analysis within a Supply Chain Based on the Product Life Cycle.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Researching on the Growth Operator SWFZIRS of Growth Evolution Algorithms.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Algorithm of Distribution Estimation for Node Localization in Wireless Sensor Network.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
An optimal, strategy-proof scheme for multi-path traffic assignment in non-cooperative networks.
IEEE Trans. Wireless Communications, 2010

Strong-Incentive, High-Throughput Channel Assignment for Noncooperative Wireless Networks.
IEEE Trans. Parallel Distrib. Syst., 2010

A collusion-resistant routing scheme for noncooperative wireless ad hoc networks.
IEEE/ACM Trans. Netw., 2010

Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes.
IEEE Trans. Mob. Comput., 2010

Modeling Co-Expression across Species for Complex Traits: Insights to the Difference of Human and Mouse Embryonic Stem Cells.
PLoS Computational Biology, 2010

Network-based comparison of temporal gene expression patterns.
Bioinformatics, 2010

INPAC: An Enforceable Incentive Scheme for Wireless Networks using Network Coding.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Adaptive learning routing algorithm of WSNs based autonomous decentralized system approach.
Proceedings of the Sixth International Conference on Natural Computation, 2010

2009
Privacy-Preserving Backpropagation Neural Network Learning.
IEEE Trans. Neural Networks, 2009

IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks.
IEEE Trans. Information Technology in Biomedicine, 2009

An efficient protocol for private and accurate mining of support counts.
Pattern Recognition Letters, 2009

Dissecting Early Differentially Expressed Genes in a Mixture of Differentiating Embryonic Stem Cells.
PLoS Computational Biology, 2009

k-Anonymous data collection.
Inf. Sci., 2009

On Distributed k-Anonymization.
Fundam. Inform., 2009

Analysis of Kim-Jeon-Yoo Password Authentication Schemes.
Cryptologia, 2009

Perfectly fair channel assignment in non-cooperative multi-radio multi-channel wireless networks.
Computer Communications, 2009

Identity-based mix: Anonymous communications without public key certificates.
Computers & Electrical Engineering, 2009

Fuzzy Decision Tree Based Inference Technology for Spam Behavior Recognition.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

A Method for Spam Behavior Recognition Based on Fuzzy Decision Tree.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
Guided perturbation: towards private and accurate mining.
VLDB J., 2008

Preface.
J. Comput. Sci. Technol., 2008

Efficient, anonymous, and authenticated conference key setup in cellular wireless networks.
Computers & Electrical Engineering, 2008

An efficient approximation algorithm for counting n-cycles in a graph.
Applied Mathematics and Computation, 2008

Body sensor network security: an identity-based cryptography approach.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Incentive-compatible opportunistic routing for wireless networks.
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008

Welcome to SSN 2008.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Towards a Theory of Robust Localization Against Malicious Beacon Nodes.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Globally Optimal Channel Assignment for Non-Cooperative Wireless Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Adaptive Evolutionary Genetic Algorithms on a Class of Combinatorial Optimization Problems.
Proceedings of the Fourth International Conference on Natural Computation, 2008

2007
On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks.
Wireless Networks, 2007

Towards a theory of data entanglement.
Theor. Comput. Sci., 2007

Cross-species microarray analysis with the OSCAR system suggests an INSR->Pax6->NQO1 neuro-protective pathway in aging and Alzheimer's disease.
Nucleic Acids Research, 2007

Privacy-preserving algorithms for distributed mining of frequent itemsets.
Inf. Sci., 2007

Two methods for privacy preserving data mining with malicious participants.
Inf. Sci., 2007

An Attack on the Zhou-Fan-Li Authenticated Multiple-Key Agreement Protocol.
Cryptologia, 2007

TagSmart: analysis and visualization for yeast mutant fitness data measured by tag microarrays.
BMC Bioinformatics, 2007

Gene Ontology analysis in multiple gene clusters under multiple hypothesis testing framework.
Artificial Intelligence in Medicine, 2007

An efficient algorithm for topology discovery of a blackbox communication network.
Applied Mathematics and Computation, 2007

Understanding and Utilizing the Hierarchy of Abnormal BGP Events.
Proceedings of the Seventh SIAM International Conference on Data Mining, 2007

On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks.
Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, 2007

Towards Privacy-Preserving Model Selection.
Proceedings of the Privacy, 2007

Enhancing Privacy of Released Database.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

Cost-Effective Traffic Assignment for Multipath Routing in Selfish Networks.
Proceedings of the Global Communications Conference, 2007

Selection of Thermodynamic Models for Combinatorial Control of Multiple Transcription Factors in Early Differentiation of Embryonic Stem Cells.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2007

2006
Verifiable Distributed Oblivious Transfer and Mobile Agent Security.
MONET, 2006

Breaking a remote user authentication scheme for multi-server architecture.
IEEE Communications Letters, 2006

An Efficient and Secure Cryptosystem for Encrypting Long Messages.
Fundam. Inform., 2006

Privacy-Preserving Queries on Encrypted Data.
Proceedings of the Computer Security, 2006

2005
Ubic2 - Towards Ubiquitous Bio-Information Computing: Data Protocols, Middleware, and Web Services for Heterogeneous Biological Information Integration and Retrieval.
International Journal of Software Engineering and Knowledge Engineering, 2005

Privacy-Preserving Classification of Customer Data without Loss of Accuracy.
Proceedings of the 2005 SIAM International Conference on Data Mining, 2005

Privacy-enhancing k-anonymization of customer data.
Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2005

On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques.
Proceedings of the 11th Annual International Conference on Mobile Computing and Networking, 2005

Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

Anonymity-preserving data collection.
Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2005

Fundamental research on remote sensing the strain and catastrophe of concrete under uniaxial compression.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

2004
In silico prediction of transcription factors that interact with the E2F family of transcription factors.
Proceedings of the 8th International Conference on Control, 2004

Towards a Theory of Data Entanglement: (Extended Abstract).
Proceedings of the Computer Security, 2004

Comparative Analysis of Gene Sets in the Gene Ontology Space under the Multiple Hypothesis Testing Framework.
Proceedings of the 3rd International IEEE Computer Society Computational Systems Bioinformatics Conference, 2004

Towards Ubiquitous Bio-Information Computing: Data Protocols, Middleware, and Web Services for Heterogeneous Biological Information Integration and Retrieval.
Proceedings of the 4th IEEE International Symposium on BioInformatics and BioEngineering (BIBE 2004), 2004

2003
ChipInfo: software for extracting gene annotation and gene ontology information for microarray analysis.
Nucleic Acids Research, 2003

A comment on the Chen-Chung scheme for hierarchical access control.
Computers & Security, 2003

Attacks on the (enhanced) Yang-Shieh authentication.
Computers & Security, 2003

Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

Verifiable distributed oblivious transfer and mobile agent security.
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2003

2002
A practical key management scheme for access control in a user hierarchy.
Computers & Security, 2002

Optimistic Mixing for Exit-Polls.
Proceedings of the Advances in Cryptology, 2002

1998
Robust point pattern relaxation matching with missing or spurious points and random errors.
Proceedings of the Visual Information Processing VII, Orlando, FL, USA, April 13, 1998, 1998

1996
Hierarchical motion estimation based on visual patterns for video coding.
Proceedings of the 1996 IEEE International Conference on Acoustics, 1996

1995
Improved and Optimal Adaptive Hierarchical Vector Quantization for Image Coding and Indexing.
Proceedings of the International Workshop on Multi-Media Database Management Systems, 1995

1994
Adaptive hierarchical vector quantization for image coding.
Pattern Recognition Letters, 1994

1993
High compression ratio image compression.
Proceedings of the 1993 IEEE International Symposium on Circuits and Systems, 1993


  Loading...