Author of the publication

Road Traffic Anomaly Detection via Collaborative Path Inference from GPS Snippets.

, , , , and . Sensors, 17 (3): 550 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Two-Stage Genetic Algorithm for the Multi-multicast Routing., , and . ISICA, volume 4683 of Lecture Notes in Computer Science, page 204-213. Springer, (2007)Channel state dependent robust TCP/IP header compression for 3G wireless networks., , , , and . IPCCC, page 141-145. IEEE, (2004)DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware., , , , , , and . DSN, page 430-441. IEEE Computer Society, (2018)A Reliable Region based Hierarchical Mobile Multicast Protocol for IPv6 Network., , and . MWCN, World Scientific, (2003)A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems., , , , , and . ICICS, volume 9977 of Lecture Notes in Computer Science, page 27-36. Springer, (2016)Hierarchical Aligned Multimodal Learning for NER on Tweet Posts., , , , , , and . AAAI, page 18680-18688. AAAI Press, (2024)Adaptive robust TCP/IP header compression algorithm for 3G wireless networks., , and . WCNC, page 1046-1050. IEEE, (2004)Poster Abstract: Smartphone Heterogeneous Network Handoff Based on the Closed Control Loop., , , and . ICCPS, page 231. IEEE Computer Society, (2012)Performance Analysis and Resource Allocation for IEEE 802.11 based Wireless Networks., , , and . PIMRC, page 1-5. IEEE, (2006)Poster: Towards Fully Distributed User Authentication with Blockchain., , , , and . PAC, page 202-203. IEEE, (2017)