Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fine-grained detection method for gate-level hardware Trojan base on bidirectional Graph Neural Networks., , , , , and . J. King Saud Univ. Comput. Inf. Sci., 35 (10): 101822 (December 2023)Exposing the location of anonymous solar-powered homes: poster., and . WiSec, page 324-325. ACM, (2019)TRM-IoT: A trust management model based on fuzzy reputation for internet of things., , , , , and . Comput. Sci. Inf. Syst., 8 (4): 1207-1228 (2011)Standard kantorovich theorem of the chebyshev method on complex plane.. Int. J. Comput. Math., 42 (1-2): 67-70 (1992)An End-to-End Pyramid Convolutional Neural Network for Dehazing., , , , and . IGTA, volume 1043 of Communications in Computer and Information Science, page 41-50. Springer, (2019)An uncertainty-aware precision grasping process for objects with unknown dimensions., and . ICRA, page 4312-4317. IEEE, (2015)Probabilistic multi-sensor fusion based on signed distance functions., , , , and . ICRA, page 1873-1878. IEEE, (2016)Joint Clusters and Iterative Graph Cuts for ALS Point Cloud Filtering., , , , and . IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 11 (3): 990-1004 (2018)Performance analysis of a distributed 6LoWPAN network for the Smart Grid applications., , and . ISSNIP, page 1-6. IEEE, (2014)Automatic Mapping Single-Device OpenCL Program to Heterogeneous Multi-device Platform., , , , and . HPCC/EUC, page 135-142. IEEE, (2013)