Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cost-Sensitive Semi-Supervised Personalized Semantic Place Label Recognition Using Multi-Context Data., , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 1 (3): 116:1-116:14 (2017)A Risk control Framework for Mortgaged Cars based on trajectory Mining., , , , , and . Int. J. Robotics Autom., (2020)Smartphone-based activity recognition independent of device orientation and placement., , , and . Int. J. Commun. Syst., 29 (16): 2403-2415 (2016)A hybrid deep convolutional and recurrent neural network for complex activity recognition using multimodal sensors., , and . Neurocomputing, (2019)Extracting semantic event information from distributed sensing devices using fuzzy sets., , , , and . Fuzzy Sets Syst., (2018)Mining user similarity based on routine activities., , and . Inf. Sci., (2013)Discovering individual movement patterns from cell-id trajectory data by exploiting handoff features., , , , and . Inf. Sci., (2019)DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network., , , , and . KSII Trans. Internet Inf. Syst., 13 (4): 2180-2197 (2019)Mining cell-id trajectory patterns by exploiting handoff features., , , and . UbiComp Adjunct, page 153-156. ACM, (2016)CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters., , , and . Comput. Secur., (January 2024)