Author of the publication

Multiscale Analysis of Intensive Longitudinal Biomedical Signals and Its Clinical Applications.

, , , , and . Proc. IEEE, 104 (2): 242-261 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Door Access Control System with Mobile Phones., , , and . PWC, volume 245 of IFIP, page 230-240. Springer, (2007)Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences., , , and . DPM/CBT@ESORICS, volume 10436 of Lecture Notes in Computer Science, page 107-123. Springer, (2017)Explainable Machine Learning for Default Privacy Setting Prediction., , , and . IEEE Access, (2021)An Anonymous Authentication Protocol with Single-database PIR., , , , and . AISC, volume 116 of CRPIT, page 3-8. Australian Computer Society, (2011)Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions., , , , and . Theor. Comput. Sci., (2021)The Effects of Nudging a Privacy Setting Suggestion Algorithm's Outputs on User Acceptability., , , , and . J. Inf. Process., (2019)Effects of environmental control before sleeping on autonomic nervous activity and sleep: A pilot study., , , , , , , and . J. Ambient Intell. Smart Environ., 15 (2): 165-178 (2023)TRANSDIRE: data-driven direct reprogramming by a pioneer factor-guided trans-omics approach., , , , , and . Bioinform., 38 (10): 2839-2846 (2022)MilliSign: mmWave-Based Passive Signs for Guiding UAVs in Poor Visibility Conditions., , , , , and . MobiCom, page 50:1-50:15. ACM, (2023)Application and Limitations of Digital Signature Schemes for Implementing Non-Fungible Token (NFT)., , , , and . ASSE, page 119-125. ACM, (2023)