Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-time chaotic video encryption based on multithreaded parallel confusion and diffusion., , , and . CoRR, (2023)Surrogate-assisted Phasmatodea population evolution algorithm applied to wireless sensor networks., , , and . Wirel. Networks, 29 (2): 637-655 (February 2023)A Practical Non-Intrusive Cyber Security Vulnerability Assessment Method for Cyber-Insurance., , and . DSC, page 261-269. IEEE, (2023)NiNSRAPM: An Ensemble Learning Based Non-intrusive Network Security Risk Assessment Prediction Model., , , , and . DSC, page 17-23. IEEE, (2022)Gating threshold value determination for the motion gating of positron emission tomography/computed tomography., , , , , , and . BMEI, page 189-193. IEEE, (2014)Updating control modes based on terrain classification., , and . ICRA, page 4417-4423. IEEE, (2010)Subpixel Interpolation Architecture for Multistandard Video Motion Estimation., , and . IEEE Trans. Circuits Syst. Video Techn., 19 (12): 1897-1901 (2009)Design of Switched Linear Systems in the Presence of Actuator Saturation., and . IEEE Trans. Automat. Contr., 53 (6): 1536-1542 (2008)Terrain surface classification for autonomous ground vehicles using a 2D laser stripe-based structured light sensor., , , and . IROS, page 2174-2181. IEEE, (2009)A Transformer with Interleaved Self-attention and Convolution for Hybrid Acoustic Models.. CoRR, (2019)