Author of the publication

Ontology-Based Information Content Security Analysis.

, , and . FSKD (5), page 479-483. IEEE Computer Society, (2008)978-0-7695-3305-6.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fast algorithm for data erasure., and . ISI, page 254-256. IEEE, (2008)Power optimization for target localization with reconfigurable intelligent surfaces., , , , and . Signal Process., (2021)Investigation of the Effect of Increased Dimension Levels in Speech Emotion Recognition., , and . IEEE Access, (2022)DIST: spatial transcriptomics enhancement using deep learning., , and . Briefings Bioinform., (March 2023)Joint Route and Power Optimization for Multi-UAV-Enabled Colocated MIMO Radar System., , , , , and . WCSP, page 598-603. IEEE, (2023)Measuring Emotion Bifurcation Points for Individuals in Social Media., , , and . HICSS, page 1949-1958. IEEE Computer Society, (2016)Anomaly Detection and Array Diagnosis in Wireless Networks with Multiple Antennas: Framework, Challenges and Tools., , , and . IEEE Netw., 32 (1): 152-159 (2018)Robot visual navigation estimation and target localization based on neural network., , and . Paladyn J. Behav. Robotics, 13 (1): 76-83 (2022)Anomalous Subgraph Detection in Given Expected Degree Networks With Deep Learning., , , and . IEEE Access, (2021)Short-Term Capital Flows in China: Trend, Determinants and Policy Implications., , and . ICCS (2), volume 5545 of Lecture Notes in Computer Science, page 552-560. Springer, (2009)