From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mitigating Adversarial Attacks using Pruning., , и . IC3, стр. 523-529. ACM, (2023)Mid Price Prediction via Statistical Feature Expansion and Kernel Adaptive Filtering., , и . IC3, стр. 461-466. ACM, (2022)Securing IP Cores in CE Systems using Key-driven Hash-chaining based Steganography., , , и . ICCE-Berlin, стр. 1-4. IEEE, (2020)Neighbor-Node Analysis based Min-Max Algorithm to Generate Optimized Route in WSN., и . IC3, стр. 616-621. ACM, (2022)Close-Price Prediction using Online Kernel Adaptive Filtering., , и . IC3, стр. 217-222. ACM, (2021)Cost Aware Majority Logic Synthesis for Emerging Technologies.. iNIS, стр. 69-73. IEEE, (2017)Topographical Feature Extraction Using Machine Learning Techniques from Sentinel-2A Imagery., , , и . IGARSS, стр. 1659-1662. IEEE, (2020)Swarm Intelligence Driven Simultaneous Adaptive Exploration of Datapath and Loop Unrolling Factor during Area-Performance Tradeoff., и . ISVLSI, стр. 106-111. IEEE Computer Society, (2014)D-logic exploration: Rapid search of Pareto fronts during architectural synthesis of custom processors., и . ICACCI, стр. 586-593. IEEE, (2013)Time Varying vs. Fixed Acceleration Coefficient PSO Driven Exploration during High Level Synthesis: Performance and Quality Assessment., и . ICIT, стр. 281-286. IEEE, (2014)