Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LiveForen: Ensuring Live Forensic Integrity in the Cloud., , , , and . IEEE Trans. Inf. Forensics Secur., 14 (10): 2749-2764 (2019)A Parallel Prefix Convex Hill Algorithm Using MasPar., , and . PDPTA, page 1089-1095. CSREA Press, (2002)A direct up-conversion transmitter architecture for TD-SCDMA handset., , and . PIMRC, page 2900-2904. IEEE, (2003)Towards a forensic-aware file system., and . EIT, page 84-89. IEEE, (2008)Asynchronous Callback in Web Services., , and . SNPD, page 375-380. IEEE Computer Society, (2006)Generating Orthogonal Voronoi Treemap for Visualization of Hierarchical Data., , , and . CGI, volume 12221 of Lecture Notes in Computer Science, page 394-402. Springer, (2020)Dual-level contrastive learning network for generalized zero-shot learning., , , , and . Vis. Comput., 38 (9): 3087-3095 (2022)Resource Allocation Optimization for GSD Projects., , , and . ICCSA (2), volume 5593 of Lecture Notes in Computer Science, page 13-28. Springer, (2009)A Framework for Enhancing Web Services Security., and . COMPSAC (1), page 23-30. IEEE Computer Society, (2007)Triple Disentangling Network for Unsupervised Domain Adaptation., , , , , and . ICME, page 1-6. IEEE, (2022)