Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy-import hashing: A static analysis technique for malware detection., , , , , and . Digit. Investig., (2021)Internal Model Control Structure Inspired Robotic Calligraphy System., , , , , , , and . IEEE Trans. Ind. Informatics, 20 (2): 2600-2610 (February 2024)GANCCRobot: Generative adversarial nets based chinese calligraphy robot., , , , , and . Inf. Sci., (2020)Adoption of Cloud Computing in Hotel Industry as Emerging Services., , , and . iConference, volume 10766 of Lecture Notes in Computer Science, page 218-228. Springer, (2018)Integration strategies for toxicity data from an empirical perspective., and . UKCI, page 1-8. IEEE, (2014)Multi-criterion mammographic risk analysis supported with multi-label fuzzy-rough feature selection., , , , , and . Artif. Intell. Medicine, (2019)Toxicity risk assessment from heterogeneous uncertain data with possibility-probability distribution., and . FUZZ-IEEE, IEEE, (2013)Dendritic Cell Algorithm Enhancement Using Fuzzy Inference System for Network Intrusion Detection., , , and . FUZZ-IEEE, page 1-6. IEEE, (2019)Adaptive fuzzy interpolation and extrapolation with multiple-antecedent rules., and . FUZZ-IEEE, page 1-8. IEEE, (2010)Grooming Detection using Fuzzy-Rough Feature Selection and Text Classification., , , , and . FUZZ-IEEE, page 1-8. IEEE, (2018)