Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting acoustic backdoor transmission of inaudible messages using deep learning., , , and . WiseML@WiSec, page 80-85. ACM, (2020)Measuring Regret in Routing: Assessing the Impact of Increased App Usage., , , , , , , , and . ITSC, page 2589-2594. IEEE, (2018)Transient protein-protein interface prediction: datasets, features, algorithms, and the RAD-T predictor., , , , , , , , and . BMC Bioinform., (2014)Comparisons Between Text-Only and Multimedia Tweets on User Engagement., , and . SMC, page 3825-3831. IEEE, (2020)Intelligent noncontact surgeon-computer interface using hand gesture recognition., , , and . Three-Dimensional Image Capture and Applications, volume 6805 of SPIE Proceedings, page 68050U. SPIE, (2008)A Decision Support System for Evaluating the Impacts of Routing Applications on Urban Mobility., , , , , , , and . ITSC, page 513-518. IEEE, (2018)Sentiment Predictability for Stocks., , , and . CoRR, (2017)Inaudible Manipulation of Voice-Enabled Devices Through BackDoor Using Robust Adversarial Audio Attacks: Invited Paper., , , , , and . WiseML@WiSec, page 37-42. ACM, (2021)The future of smart antennas: evolution to 3G and IP networks., , , and . PIMRC, page 48-54. IEEE, (2000)