Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive fuzzy interpolation and extrapolation with multiple-antecedent rules., and . FUZZ-IEEE, page 1-8. IEEE, (2010)Dendritic Cell Algorithm Enhancement Using Fuzzy Inference System for Network Intrusion Detection., , , and . FUZZ-IEEE, page 1-6. IEEE, (2019)Toxicity risk assessment from heterogeneous uncertain data with possibility-probability distribution., and . FUZZ-IEEE, IEEE, (2013)Grooming Detection using Fuzzy-Rough Feature Selection and Text Classification., , , , and . FUZZ-IEEE, page 1-8. IEEE, (2018)Integration strategies for toxicity data from an empirical perspective., and . UKCI, page 1-8. IEEE, (2014)Towards a Robotic Chinese Calligraphy Writing Framework., , , , , , and . ROBIO, page 493-498. IEEE, (2018)GANCCRobot: Generative adversarial nets based chinese calligraphy robot., , , , , and . Inf. Sci., (2020)A robot calligraphy system: From simple to complex writing by human gestures., , , , , , , and . Eng. Appl. Artif. Intell., (2017)Adoption of Cloud Computing in Hotel Industry as Emerging Services., , , and . iConference, volume 10766 of Lecture Notes in Computer Science, page 218-228. Springer, (2018)Android Malware Classification and Optimisation Based on BM25 Score of Android API., , , and . INFOCOM Workshops, page 1-6. IEEE, (2023)