Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel scheme for hybrid digital video watermarking: approach, evaluation and experimentation., , and . IEEE Trans. Circuits Syst. Video Techn., 15 (12): 1638-1649 (2005)QoS Prediction in Cloud and Service Computing - Approaches and Applications, and . Springer Briefs in Computer Science Springer, (2017)Affinity rank: a new scheme for efficient web search., , , , and . WWW (Alternate Track Papers & Posters), page 338-339. ACM, (2004)Automating App Review Response Generation., , , , , and . CoRR, (2020)Automatic string test data generation for detecting domain errors., , and . Softw. Test. Verification Reliab., 20 (3): 209-236 (2010)Extraction of karyocytes and their components from microscopic bone marrow images based on regional color features., , , and . Pattern Recognit., 37 (2): 351-361 (2004)Reliability assessment and sensitivity analysis of software reliability growth modeling based on software module structure., , , , and . J. Syst. Softw., 76 (1): 3-13 (2005)High-Resolution Deep Convolutional Generative Adversarial Networks, , , , and . (2017)cite arxiv:1711.06491.Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones., , and . SOUPS, page 187-198. USENIX Association, (2014)Software diversity metrics and measurements., , and . COMPSAC, page 69-78. IEEE, (1992)