Tang, Yuan-Liang
39813  results:
Search for persons X
?
 
?
2

Image Authentication and Recovery through Optimal Selection..:

CHEN, Chun-Hung ; TANG, Yuan-Liang ; HSIEH, Wen-Shyong
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  E98.A (2015)  5 - p. 1126-1129 , 2015
 
?
4

A robust watermarking technique based on the polarity relat..:

, In: 2015 IEEE 12th International Conference on Networking, Sensing and Control,
 
?
7

Print-and-Scan Resilient Watermarking through Polarizing DC..:

CHEN, Chun-Hung ; TANG, Yuan-Liang ; HSIEH, Wen-Shyong
IEICE Transactions on Information and Systems.  E96.D (2013)  10 - p. 2208-2214 , 2013
 
?
9

A secure and efficient authentication protocol for anonymou..:

Yang, Chou-Chen ; Tang, Yuan-Liang ; Wang, Ren-Chiun.
Applied Mathematics and Computation.  169 (2005)  2 - p. 1431-1439 , 2005
 
?
10

A simple remote user authentication scheme:

Hwang, Min-Shiang ; Lee, Cheng-Chi ; Tang, Yuan-Liang
Mathematical and Computer Modelling.  36 (2002)  1-2 - p. 103-107 , 2002
 
?
11

Tracking moving objects during low altitude flight:

Tang, Yuan-Liang ; Kasturi, Rangachar
Machine Vision and Applications.  9 (1996)  1 - p. 20-31 , 1996
 
?
12

Accurate estimation of object location in an image sequence..:

Tang, Yuan-Liang ; Kasturi, Rangachar
Robotics and Computer-Integrated Manufacturing.  11 (1994)  2 - p. 65-72 , 1994
 
?
 
1-15