Author of the publication

Convolutional neural networks for wavelet domain super resolution.

, , and . Pattern Recognit. Lett., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Concurrent multipath transmission with forward error correction mechanism to overcome burst packet losses for delay-sensitive video streaming in wireless home networks., , and . Multimedia Tools Appl., 65 (2): 201-220 (2013)Enhanced three-factor security protocol for consumer USB mass storage devices., , , and . IEEE Trans. Consumer Electronics, 60 (1): 30-37 (2014)Possible Electromagnetic Hypersensitivity among Cellular Phone Users in Relevance to Self Reported Subjective Symptoms and Sensations and Adopted Safety Measures. Health Informatics - An International Journal (HIIJ), 01 (01): 09-17 (August 2012)Ensuring Privacy and Security in E- Health Records., , , , , , and . CITS, page 1-5. IEEE, (2018)Deep Learning-Based Image Kernel for Inductive Transfer., , , and . CoRR, (2015)Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications., , , , , , and . IEEE Access, (2017)LOADS: Load Optimization and Anomaly Detection Scheme for Software-Defined Networks., and . IEEE Trans. Vehicular Technology, 68 (12): 12329-12344 (2019)Computing Shortest Paths in the Plane with Removable Obstacles., , , and . SWAT, volume 101 of LIPIcs, page 5:1-5:15. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)Towards energy-aware fog-enabled cloud of things for healthcare., , , , , and . Comput. Electr. Eng., (2018)Efficient provably secure password-based explicit authenticated key agreement., , , and . Pervasive Mob. Comput., (2015)