Author of the publication

Biology-inspired artificial neural network solutions for android control.

, and . MeMeA, page 145-150. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Soft Object Deformation Monitoring and Learning for Model-Based Robotic Hand Manipulation., , and . IEEE Trans. Syst. Man Cybern. Part B, 42 (3): 740-753 (2012)A Deep Model of Visual Attention for Saliency Detection on 3D Objects., , and . Neural Process. Lett., 55 (7): 8847-8867 (December 2023)Neural Network Mapping and Clustering of Elastic Behavior From Tactile and Range Imaging for Virtualized Reality Applications., , and . IEEE Trans. Instrum. Meas., 57 (9): 1918-1928 (2008)Robotic tactile recognition of pseudorandom encoded objects., , , , and . IEEE Trans. Instrum. Meas., 53 (5): 1425-1432 (2004)PSO-Based Modeling and Analysis of Electrical Characteristics of Photovoltaic Module Under Nonuniform Snow Patterns., , , , and . IEEE Access, (2020)Inducing an Anxiety Response Using a Contaminated Virtual Environment: Validation of a Therapeutic Tool for Obsessive-Compulsive Disorder., , , and . Frontiers ICT, (2016)Selectively densified 3D object modeling based on regions of interest detection using neural gas networks., , and . Soft Comput., 21 (18): 5443-5455 (2017)Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning., , and . CoRR, (2021)QuerySnout: Automating the Discovery of Attribute Inference Attacks against Query-Based Systems., , , and . CCS, page 623-637. ACM, (2022)Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning., , and . USENIX Security Symposium, page 2317-2334. USENIX Association, (2022)