Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Common pattern of population decline for freshwater cetacean species in deteriorating habitats, , , , and . Freshwater Biology, 57 (6): 1266--1276 (March 2012)On 2-D Direction-of-Arrival Estimation Performance for Rank Reduction Estimator in Presence of Unexpected Modeling Errors., , and . CSSP, 33 (2): 515-547 (2014)Full-range adaptive cruise control based on supervised adaptive dynamic programming., , , , , and . Neurocomputing, (2014)On the Security of an Improved Password Authentication Scheme Based on ECC., and . IACR Cryptology ePrint Archive, (2012)Zipf's Law in Passwords., , and . IACR Cryptology ePrint Archive, (2014)Switched control of type-2 polynomial discrete fuzzy systems based on SOS., , and . FSKD, page 108-113. IEEE, (2013)CSIID: WiFi-based Human Identification via Deep Learning., , , and . ICCSE, page 326-330. IEEE, (2019)Quadratic constrained weighted least-squares method for TDOA source localization in the presence of clock synchronization bias: Analysis and solution., , , , and . Digit. Signal Process., (2018)The Emperor's New Password Creation Policies: An Evaluation of Leading Web Services and the Effect of Role in Resisting Against Online Guessing., and . ESORICS (2), volume 9327 of Lecture Notes in Computer Science, page 456-477. Springer, (2015)Structural reliability analysis based on polynomial chaos, Voronoi cells and dimension reduction technique., and . Reliab. Eng. Syst. Saf., (2019)