Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exponential Extended Dissipativity Analysis of Discrete-Time Neural Networks With Large Delays., , , , and . IEEE Trans. Netw. Sci. Eng., 11 (1): 1055-1064 (January 2024)A robust iterative super-resolution mosaicking algorithm using an adaptive and directional Huber-Markov regularization., , and . J. Vis. Commun. Image Represent., (2016)Analysis and Resolution of Semantic Ambiguity of Toggle Buttons by Standardizing the Design in Software GUI and Mobile Apps., , and . IJHCR, 8 (2): 1-18 (2017)Secure spatial trajectory prediction based on traffic flows., , and . EIT, page 723-727. IEEE, (2016)Mobile Health Text Misinformation Identification Using Mobile Data Mining., , and . CoRR, (2024)Detection of GPS Spoofing Attacks on Unmanned Aerial Systems., , , , and . CCNC, page 1-6. IEEE, (2019)Trust Computing for Social Networking., , and . ITNG, page 1534-1539. IEEE Computer Society, (2009)An XML World Wide Web Search Engine Using Approximate Structural Matching., , , and . ISAS-SCI (1), page 410-415. IIIS, (2001)A Bayesian model of the aggregate interference power in cognitive radio networks., , , and . UEMCON, page 1-7. IEEE, (2016)Trust-Based Information Risk Management in a Supply Chain Network., and . Int. J. Inf. Syst. Supply Chain Manag., 2 (3): 19-34 (2009)