Author of the publication

Error-Related Neural Responses Recorded by Electroencephalography During Post-stroke Rehabilitation Movements.

, , , , and . Frontiers Neurorobotics, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table., , and . Trustcom/BigDataSE/ISPA, page 394-401. IEEE, (2016)An Adaptive Service Strategy Based on User Rating in P2P., , , and . GCC, volume 3795 of Lecture Notes in Computer Science, page 860-870. Springer, (2005)A Longitudinal Investigation of the Efficacy of Supported In-Home Post-Stroke Rehabilitation., , , , and . IEEE Access, (2020)Trust-Aware sensing Quality estimation for team Crowdsourcing in social IoT., , , , and . Comput. Networks, (2021)Social Bots Detection on Mobile Social Networks., and . Int. J. Netw. Secur., 19 (1): 163-166 (2017)A Worm Containment Model Based on Neighbor-Alarm., , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 449-457. Springer, (2007)Malware Behavior Capturing Based on Taint Propagation and Stack Backtracing., , and . TrustCom, page 328-335. IEEE Computer Society, (2011)PerformTrust: Trust model integrated past and current performance in P2P file sharing systems., , , and . AICCSA, page 718-725. IEEE Computer Society, (2008)"Jekyll and Hyde" is Risky: Shared-Everything Threat Mitigation in Dual-Instance Apps., , , and . MobiSys, page 222-235. ACM, (2019)Android App Malicious Behavior Detection Based on User Intention., , , and . Trustcom/BigDataSE/ISPA, page 560-567. IEEE, (2016)