Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Logistic Regression and Random Forest for Effective Imbalanced Classification., , , , and . COMPSAC (1), page 916-917. IEEE, (2019)Sector-Specific Information Infrastructure Issues in the Oil, Gas, and Petrochemical Sector., , and . Critical Infrastructure Protection, volume 7130 of Lecture Notes in Computer Science, Springer, (2012)SPP-CPI: Predicting Compound-Protein Interactions Based On Neural Networks., , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 19 (1): 40-47 (2022)protein2vec: Predicting Protein-Protein Interactions Based on LSTM., , and . IEEE ACM Trans. Comput. Biol. Bioinform., 19 (3): 1257-1266 (2022)Cover Image., , , , , and . J. Comput. Chem., 43 (4): i (2022)BCM-DTI: A fragment-oriented method for drug-target interaction prediction using deep learning., , , , and . Comput. Biol. Chem., (June 2023)A Novel Method for Video Moving Object Detection Using Improved Independent Component Analysis., , and . IEEE Trans. Circuits Syst. Video Technol., 31 (6): 2217-2230 (2021)High Performance RDMA-based Multi-port All-gather on Multi-rail QsNet II., and . HPCS, page 3. IEEE Computer Society, (2007)Security Threat Analysis of SDN Switch Flow Table., , , and . ICCCN, page 1-2. IEEE, (2018)Camera calibration from very few images based on soft constraint optimization., , , , , , and . J. Frankl. Inst., 357 (4): 2561-2584 (2020)