Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic reading system based on automatic alignment control for pointer meter., , , , and . IECON, page 3414-3418. IEEE, (2014)martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture., , , and . CCS, page 1496-1510. ACM, (2023)Kinematic Optimization of a Continuum Surgical Manipulator., , , , and . ROBIO, page 2069-2074. IEEE, (2018)A Light-Weight and Quality-Aware Online Adaptive Sampling Approach for Streaming Social Sensing in Cloud Computing., , , , and . ICPADS, page 1-8. IEEE, (2018)ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum., , , , , and . IEEE Trans. Mob. Comput., 18 (10): 2270-2284 (2019)Analyzing the Browser Security Warnings on HTTPS Errors., , , , , and . ICC, page 1-6. IEEE, (2019)Online Personalized Recommendation Based on Streaming Implicit User Feedback., , , , and . APWeb, volume 9313 of Lecture Notes in Computer Science, page 720-731. Springer, (2015)Political trust in the internet context: A comparative study in 36 countries., , and . Gov. Inf. Q., (2019)Towards fast rerouting-based energy efficient routing., , and . Comput. Networks, (2014)A SQL Injection Detection Method Based on Adaptive Deep Forest., , , and . IEEE Access, (2019)