Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting user interests from contextual information., , and . SIGIR, page 363-370. ACM, (2009)Function-Oriented Programming: A New Class of Code Reuse Attack in C Applications., , and . CNS, page 1-9. IEEE, (2018)Rethinking robust and accurate application protocol identification., , , , and . Comput. Networks, (2017)Stiffness and elastic Deformation of a 3-leg 5-DOF Parallel manipulator with One Composite leg., , , , , , and . Int. J. Robotics Autom., (2014)Understanding Cross National Difference in Knowledge Seeking Behavior Model: A Survival Perspective., , , and . ICIS, page 204. Association for Information Systems, (2009)Feature Fusion Network Model Based on Dual Attention Mechanism for Hyperspectral Image Classification., , , , , and . IEEE Trans. Geosci. Remote. Sens., (2023)IoT-Enabled Fault Prediction and Maintenance for Smart Charging Piles., , , and . IEEE Internet Things J., 10 (23): 21061-21075 (December 2023)Navel Gazing or the Long View?: The Influence of Firm Positioning with Respect to OSS Communities on a Developer's Firm Embeddedness., , and . AMCIS, Association for Information Systems, (2023)Inductive Vulnerability Detection via Gated Graph Neural Network., , , , , and . CSCWD, page 519-524. IEEE, (2022)Twine Stack: A Hybrid Mechanism Achieving Less Cost for Return Address Protection., , and . ATS, page 7-12. IEEE, (2021)