Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles., , , , , and . Ad Hoc Networks, (2019)A Hyperspectral Image Denoising Approach via Low-Rank Matrix Recovery and Greedy Bilateral., , and . RIVF, page 1-6. IEEE, (2021)A Novel Hybrid Recommendation System Integrating Content-Based and Rating Information., , , , , , and . NBiS, volume 1036 of Advances in Intelligent Systems and Computing, page 325-337. Springer, (2019)Utilizing an Autoencoder-Generated Item Representation in Hybrid Recommendation System., , , and . IEEE Access, (2020)Effect of Service Interaction on The Brand Equity with a Mediating Role of Relationship Quality in Small and Medium-Size Enterprises (SMEs) in Supermarket Sector in Ho Chi Minh City (HCMC) – Vietnam, and . Imperial Journal of Interdisciplinary Research, (2017)Performance Evaluation of Cyber-Physical Intrusion Detection on a Robotic Vehicle., , and . CIT/IUCC/DASC/PICom, page 2106-2113. IEEE, (2015)Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction., , , and . CoRR, (2023)Decision tree-based detection of denial of service and command injection attacks on robotic vehicles., , , and . WIFS, page 1-6. IEEE, (2015)