Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ACRank: a multi-evidence text-mining model for alliance discovery from news articles., and . Inf. Technol. People, 33 (5): 1357-1380 (2020)A stealthy covert storage channel for asymmetric surveillance VoLTE endpoints., , , and . Future Gener. Comput. Syst., (2020)An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles., , , , , , and . Future Gener. Comput. Syst., (2019)Cryptographic key protection against FROST for mobile devices., , , , , , and . Clust. Comput., 20 (3): 2393-2402 (2017)Service offloading oriented edge server placement in smart farming., , , , , and . Softw. Pract. Exp., 51 (12): 2540-2557 (2021)Price -Based Optimal Resource Allocation in Multi-Hop Wireless Networks. University of Illinois Urbana-Champaign, USA, (2005)Online Training for Body Part Segmentation in Infant Movement Videos., , and . ISBI, page 489-492. IEEE, (2019)Investigation of probability maps in deep-learning-based brain ventricle parcellation., , , , , , , and . Medical Imaging: Image Processing, volume 12464 of SPIE Proceedings, SPIE, (2023)Mining Competitive Intelligence from Social Media: A Case Study of IBM., , and . PACIS, page 313. (2018)A Partition Approach to Lower Bounds for Zero-Visibility Cops and Robber., , , and . IWOCA, volume 11638 of Lecture Notes in Computer Science, page 442-454. Springer, (2019)