Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Zero On-Site Testing Strategies for Wireless TCMS., , , , and . IEEE Commun. Mag., 57 (9): 64-69 (2019)Error recognition of robot kinematics parameters based on genetic algorithms.. J. Ambient Intell. Humaniz. Comput., 11 (12): 6167-6176 (2020)TEE-KV: Secure Immutable Key-Value Store for Trusted Execution Environments., , , , and . SoCC, page 535. ACM, (2018)Mapping TSN Traffic Scheduling and Shaping to FPGA-Based Architecture., , and . IEEE Access, (2020)Optimal reconstruction of constrained janbu method with ADP and non-integral safety factor., , , and . Appl. Math. Comput., (November 2023)A Nonlinear Critical Surface With Input Constraints on Costate-Adaptive Dynamic Programming., , , and . IEEE Trans. Circuits Syst. II Express Briefs, 70 (11): 4088-4092 (November 2023)Optimization of Three-dimensional Face Recognition Algorithms in Financial Identity Authentication., , , , and . Int. J. Comput. Commun. Control, (March 2022)ChainDash: An Ad-Hoc Blockchain Data Analytics System., , , , , , and . Proc. VLDB Endow., 16 (12): 4022-4025 (2023)Machine Learning-Based Intrusion Detection System for Big Data Analytics in VANET., and . VTC Spring, page 1-5. IEEE, (2021)Optimal Regulation Strategy for Nonzero-Sum Games of the Immune System Using Adaptive Dynamic Programming., , , , and . IEEE Trans. Cybern., 53 (3): 1475-1484 (March 2023)