Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Selecting Post-Processing Schemes for Accurate Detection of Small Objects in Low-Resolution Wide-Area Aerial Imagery., , , , , , , , and . Remote. Sens., 14 (2): 255 (2022)Anomaly Behavior Analysis for Sensors Fault Detection., , and . SSCI, page 1718-1723. IEEE, (2023)Anomaly Behavior Analysis for IoT Network Nodes., , and . ICFNDS, page 18:1-18:6. ACM, (2019)A feature-based processing framework for real-time implementation of muscle fatigue measurement., , and . Clust. Comput., 26 (1): 385-394 (February 2023)Optimization methodology assessment for the inlet velocity profile of a hydraulic turbine draft tube: part I - computer optimization techniques., , , , and . J. Glob. Optim., 55 (1): 53-72 (2013)Vibration Analysis of an Industrial Motor with Autoencoder for Predictive Maintenance., , , and . MICAI (2), volume 13613 of Lecture Notes in Computer Science, page 252-265. Springer, (2022)IoT Security Framework for Smart Cyber Infrastructures., and . FAS*W@SASO/ICCAC, page 242-247. IEEE, (2016)Comprehensive Data Management and Analytics for General Society Survey Dataset., , , , , , , and . ICCSE, page 195-203. ACM, (2019)Enabling Risk Management for Smart Infrastructures with an Anomaly Behavior Analysis Intrusion Detection System., , , and . FAS*W@SASO/ICCAC, page 324-328. IEEE Computer Society, (2017)IoT Security Framework for Smart Water System., , , and . AICCSA, page 1285-1292. IEEE Computer Society, (2017)