Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-time chaotic video encryption based on multithreaded parallel confusion and diffusion., , , and . CoRR, (2023)Surrogate-assisted Phasmatodea population evolution algorithm applied to wireless sensor networks., , , and . Wirel. Networks, 29 (2): 637-655 (February 2023)A Practical Non-Intrusive Cyber Security Vulnerability Assessment Method for Cyber-Insurance., , and . DSC, page 261-269. IEEE, (2023)NiNSRAPM: An Ensemble Learning Based Non-intrusive Network Security Risk Assessment Prediction Model., , , , and . DSC, page 17-23. IEEE, (2022)Design of Switched Linear Systems in the Presence of Actuator Saturation., and . IEEE Trans. Automat. Contr., 53 (6): 1536-1542 (2008)Gating threshold value determination for the motion gating of positron emission tomography/computed tomography., , , , , , and . BMEI, page 189-193. IEEE, (2014)Improving chemical similarity ensemble approach in target prediction., , , and . J. Cheminformatics, 8 (1): 20:1-20:10 (2016)Autonomous Aerial Robot for High-Speed Search and Intercept Applications., , , , , , , , , and 3 other author(s). Field Robotics, 2 (1): 1320-1350 (March 2022)Terrain surface classification for autonomous ground vehicles using a 2D laser stripe-based structured light sensor., , , and . IROS, page 2174-2181. IEEE, (2009)A Transformer with Interleaved Self-attention and Convolution for Hybrid Acoustic Models.. CoRR, (2019)