Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resource allocation in underlay cognitive radio networks with full-duplex cognitive base station., and . Int. J. Commun. Syst., (2017)Inner Knowledge-based Img2Doc Scheme for Visual Question Answering., , , , and . ACM Trans. Multim. Comput. Commun. Appl., 18 (3): 76:1-76:21 (2022)Collocated Clothing Synthesis with GANs Aided by Textual Information: A Multi-Modal Framework., , , , and . ACM Trans. Multim. Comput. Commun. Appl., 20 (1): 26:1-26:25 (January 2024)A fuzzy mixed data clustering algorithm by fast search and find of density peaks., , and . Intell. Data Anal., 23 (S1): 199-224 (2019)Multimodal Emotion Recognition Method Based on Convolutional Auto-Encoder., , , , and . Int. J. Comput. Intell. Syst., 12 (1): 351-358 (2018)Privacy-Preserving Data Integrity Verification for Secure Mobile Edge Storage., , , , , and . IEEE Trans. Mob. Comput., 22 (9): 5463-5478 (September 2023)Exploring the Gap between Ideal and Reality: An Experimental Study on Continuous Scanning with Mobile Reader in RFID Systems., , , , and . IEEE Trans. Mob. Comput., 14 (11): 2272-2285 (2015)Hybrid tenso-vectorial compressive sensing for hyperspectral imaging., and . J. Electronic Imaging, 25 (3): 033001 (2016)Jammer-Assisted Legitimate Eavesdropping in Wireless Powered Suspicious Communication Networks., , and . IEEE Access, (2019)Securing SDN Infrastructure of IoT-Fog Networks From MitM Attacks., , , and . IEEE Internet Things J., 4 (5): 1156-1164 (2017)