Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-time chaotic video encryption based on multithreaded parallel confusion and diffusion., , , and . CoRR, (2023)Real-time chaotic video encryption based on multi-threaded parallel confusion and diffusion., , , , , and . Inf. Sci., (2024)Surrogate-assisted Phasmatodea population evolution algorithm applied to wireless sensor networks., , , and . Wirel. Networks, 29 (2): 637-655 (February 2023)A Practical Non-Intrusive Cyber Security Vulnerability Assessment Method for Cyber-Insurance., , and . DSC, page 261-269. IEEE, (2023)NiNSRAPM: An Ensemble Learning Based Non-intrusive Network Security Risk Assessment Prediction Model., , , , and . DSC, page 17-23. IEEE, (2022)Doctors' Personalized Outpatient Scheduling via the Many to Many Assignment with Spatio-temporal Constraints., , , and . CSCWD, page 767-772. IEEE, (2018)Tree Recurrent Neural Networks with Application to Language Modeling., , and . CoRR, (2015)PyKaldi2: Yet another speech toolkit based on Kaldi and PyTorch., , , and . CoRR, (2019)Autonomous Aerial Robot for High-Speed Search and Intercept Applications., , , , , , , , , and 3 other author(s). Field Robotics, 2 (1): 1320-1350 (March 2022)Multiplicative LSTM for sequence modelling., , , and . CoRR, (2016)