Author of the publication

Security Enhancement Methods for Mobile POS System.

, and . MOBILESoft, page 152-153. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Computational Workload Offloading Method for Web Applications.. ICCSA (1), volume 9155 of Lecture Notes in Computer Science, page 459-471. Springer, (2015)Task Aware Multi-Task Learning for Speech to Text Tasks., , , , , , , , and . ICASSP, page 7723-7727. IEEE, (2021)Chatti: A Conversational Chatbot Platform., , , , , and . AAAI Workshops, volume WS-18 of AAAI Technical Report, page 145-148. AAAI Press, (2018)Security Enhancement Methods for Mobile POS System., and . MOBILESoft, page 152-153. IEEE Computer Society, (2015)Architecture for Automatic Generation of User Interaction Guides with Intelligent Assistant., , , , and . AINA Workshops, page 352-355. IEEE Computer Society, (2017)Deep Reinforcement Learning for Chatbots Using Clustered Actions and Human-Likeness Rewards, , , , , and . (July 2019)cite arxiv:1908.10331Comment: In International Joint Conference of Neural Networks (IJCNN), 2019.Design and implementation of cloud offloading framework among devices for web applications.. CCNC, page 41-46. IEEE, (2015)Generating Gender-Ambiguous Text-to-Speech Voices., , , , , , , , , and 3 other author(s). CoRR, (2022)Learning utterance-level representations through token-level acoustic latents prediction for Expressive Speech Synthesis., , , , , , , , and . CoRR, (2022)Data Pipeline for Generation and Recommendation of the IoT Rules Based on Open Text Data., , and . AINA Workshops, page 238-242. IEEE Computer Society, (2016)