Author of the publication

Cumuliform cloud formation control using parameter-predicting convolutional neural network.

, , , , , , , and . Graph. Model., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EPIC: Efficient Privacy-Preserving Contact Tracing for Infection Detection., , and . ICC, page 1-6. IEEE, (2018)Demo: Wanda, Securely Introducing Mobile Devices., , , and . MobiSys (Companion Volume), page 113. ACM, (2016)Automatic sub-category partitioning and parts localization for learning a robust object model., , and . Image Vis. Comput., 32 (9): 579-589 (2014)A simple deniable authentication protocol based on the Diffie-Hellman algorithm., , , , and . Int. J. Comput. Math., 85 (9): 1315-1323 (2008)Proxy re-encryption with keyword search., , , and . Inf. Sci., 180 (13): 2576-2587 (2010)A Simple User Authentication Scheme for Grid Computing., , , and . Int. J. Netw. Secur., 7 (2): 202-206 (2008)HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks., , , , and . Comput. Commun., 35 (15): 1910-1920 (2012)CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service., , , , , and . IEEE Internet Things J., 1 (1): 46-57 (2014)SPFM: Scalable and Privacy-Preserving Friend Matching in Mobile Cloud., , , , , and . IEEE Internet Things J., 4 (2): 583-591 (2017)ASEHM: a new transmission control mechanism for remote rendering system., , , and . Multim. Tools Appl., 69 (3): 585-603 (2014)