Author of the publication

Efficient and effective automated surveillance agents using kernel tricks.

, , , and . Simul., 89 (5): 562-577 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Equivalence Checking of Scheduling in High-Level Synthesis Using Deep State Sequences., , , and . IEEE Access, (2019)Adaptive jammer localization in wireless networks., , , and . Comput. Networks, (2018)Phase Timing Optimization for Smart Traffic Control Based on Fog Computing., , , and . IEEE Access, (2019)RSU-Empowered Resource Pooling for Task Scheduling in Vehicular Fog Computing., , , , and . IWCMC, page 1758-1763. IEEE, (2020)IPFRA: An Online Protocol Reverse Analysis Mechanism., , , , and . ICCCS (4), volume 11066 of Lecture Notes in Computer Science, page 324-333. Springer, (2018)A Delay Step Based Geolocation Data Verification Method., , , , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 426-438. Springer, (2018)Intelligent Resource Allocation for Utility Optimization in RSU-Empowered Vehicular Network., , , , , and . IEEE Access, (2020)A cost-efficient elastic UAV relay network construction method with guaranteed QoS., , , and . Ad Hoc Networks, (2020)Joint UAV Trajectory Planning, DAG Task Scheduling, and Service Function Deployment Based on DRL in UAV-Empowered Edge Computing., , , , , and . IEEE Internet Things J., 10 (14): 12826-12838 (July 2023)Is low-rate distributed denial of service a great threat to the Internet?, , , and . IET Inf. Secur., 15 (5): 351-363 (2021)