Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attack and defense mechanisms of malicious EPC event injection in EPC discovery service., , and . RFID-TA, page 1-6. IEEE, (2013)Visual attention based image zero watermark scheme with ensemble similarity., , , and . WCSP, page 1-5. IEEE, (2013)Finding Motifs of Financial Data Streams in Real Time., , , , and . ISICA, volume 5370 of Lecture Notes in Computer Science, page 546-555. Springer, (2008)A New Task Scheduling for Minimizing Completion Time and Execution Cost in Smart Grid Cloud., , , , , and . ComComAP, page 151-156. IEEE, (2019)A Multichannel MAC Protocol for Underwater Acoustic Sensor Networks., , and . WUWNet, page 2:1-2:5. ACM, (2014)Impact of Early and Late Visual Deprivation on the Structure of the Corpus Callosum: A Study Combining Thickness Profile with Surface Tensor-Based Morphometry., , , , , , , , , and . Neuroinformatics, 13 (3): 321-336 (2015)Deep Learning-Based Automatic Modulation Recognition Method in the Presence of Phase Offset., , , , , and . IEEE Access, (2020)Attention based deep neural network for micro-fracture extraction of sequential coal rock CT images., , , and . Multim. Tools Appl., 81 (18): 26463-26482 (2022)Smart Building Energy Management using Nonlinear Economic Model Predictive Control., , , , and . CoRR, (2019)Applying tensor-based morphometry to parametric surfaces can improve MRI-based disease diagnosis., , , , , , , and . NeuroImage, (2013)