Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Modified Multi-objective Binary Particle Swarm Optimization Algorithm., , , and . ICSI (2), volume 6729 of Lecture Notes in Computer Science, page 41-48. Springer, (2011)Auto-JacoBin: Auto-encoder Jacobian Binary Hashing., , , , and . CoRR, (2016)How to select hashing bits? A direct measurement approach., , , and . IVCNZ, page 1-6. IEEE, (2015)Optimal node placement in industrial Wireless Sensor Networks using adaptive mutation probability binary Particle Swarm Optimization algorithm., , , , and . ICNC, page 2199-2203. IEEE, (2011)NOKMeans: Non-Orthogonal K-means Hashing., , , and . ACCV (1), volume 9003 of Lecture Notes in Computer Science, page 162-177. Springer, (2014)Deep Learning-Based Intrusion Detection for IoT Networks., , , , , and . PRDC, page 256-265. IEEE, (2019)A Modified Binary Differential Evolution Algorithm., , , and . LSMS/ICSEE (2), volume 6329 of Lecture Notes in Computer Science, page 49-57. Springer, (2010)Improved Spectral Clustering Using Adaptive Mahalanobis Distance., , , and . ACPR, page 171-175. IEEE, (2013)A Novel Hybrid Binary PSO Algorithm., , , and . ICSI (1), volume 6728 of Lecture Notes in Computer Science, page 93-100. Springer, (2011)Action recognition based on principal geodesic analysis., , , and . IVCNZ, page 259-264. IEEE, (2013)