A comparison of methods for 3D scene shape retrieval
Yuan, Juefei, Abdul-Rashid, Hameed, Li, Bo, Lu, Yijuan, Schreck, Tobias, Bai, Song, Bai, Xiang, Bui, Ngoc-Minh, Do, Minh N., Do, Trong-Le, Duong, Anh-Duc, He, Kai, He, Xinwei, Holenderski, Mike, Jarnikov, Dmitri, Le, Tu-Khiem, Li, Wenhui, Liu, Anan, Liu, Xiaolong, Menkovski, Vlado, Nguyen, Khac-Tuan, Nguyen, Thanh-An, Nguyen, Vinh-Tiep, Nie, Weizhi, Ninh, Van-Tu, Rey, Perez, Su, Yuting, Ton-That, Vinh, Tran, Minh-Triet, Wang, Tianyang, Xiang, Shu, Zhe, Shandian, Zhou, Heyu, Zhou, Yang, Zhou, Zhichao
Published in Computer vision and image understanding (01.12.2020)
Published in Computer vision and image understanding (01.12.2020)
Get full text
Journal Article
Provable Identity Based User Authentication Scheme on ECC in Multi-server Environment
Truong, Toan-Thinh, Tran, Minh-Triet, Duong, Anh-Duc, Echizen, Isao
Published in Wireless personal communications (01.08.2017)
Published in Wireless personal communications (01.08.2017)
Get full text
Journal Article
Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment
Truong, Toan-Thinh, Duong, Anh-Duc, Tran, Minh-Triet
Published in Security and communication networks (01.01.2019)
Published in Security and communication networks (01.01.2019)
Get full text
Journal Article
Fatal Septic Shock Due to Aeromonas Hydrophila in a Cirrhotic Patient; a Case Report
Hoa, Do Thanh, Duc, Vu Anh, Ghi, Nguyen Hai, Duong Le, Xuan, Anh, Duong Duc
Published in Archives of academic emergency medicine (01.01.2024)
Published in Archives of academic emergency medicine (01.01.2024)
Get full text
Journal Article
Enhanced Dynamic Authentication Scheme (EDAS)
Truong, Toan-Thinh, Tran, Minh-Triet, Duong, Anh-Duc
Published in Information systems frontiers (01.03.2014)
Published in Information systems frontiers (01.03.2014)
Get full text
Journal Article
Smart Card Based User Authentication Scheme with Anonymity
Truong, Toan-Thinh, Tran, Minh-Triet, Duong, Anh-Duc
Published in Future Data and Security Engineering (2014)
Published in Future Data and Security Engineering (2014)
Get full text
Book Chapter
You always look again: Learning to detect the unseen objects
Nguyen, Khanh-Duy, Nguyen, Khang, Le, Duy-Dinh, Duong, Duc Anh, Nguyen, Tam V.
Published in Journal of visual communication and image representation (01.04.2019)
Published in Journal of visual communication and image representation (01.04.2019)
Get full text
Journal Article
Chebyshev Polynomial-Based Authentication Scheme in Multiserver Environment
Truong, Toan-Thinh, Duong, Anh-Duc, Tran, Minh-Triet
Published in Security and communication networks (25.08.2020)
Published in Security and communication networks (25.08.2020)
Get full text
Journal Article
Evaluation of multiple features for violent scenes detection
Lam, Vu, Phan, Sang, Le, Duy-Dinh, Duong, Duc Anh, Satoh, Shin’ichi
Published in Multimedia tools and applications (01.03.2017)
Published in Multimedia tools and applications (01.03.2017)
Get full text
Journal Article
YADA: you always dream again for better object detection
Nguyen, Khanh-Duy, Nguyen, Khang, Le, Duy-Dinh, Duong, Duc Anh, Nguyen, Tam V.
Published in Multimedia tools and applications (01.10.2019)
Published in Multimedia tools and applications (01.10.2019)
Get full text
Journal Article