Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smart Transportation: An Overview of Technologies and Applications., , , , , and . Sensors, 23 (8): 3880 (2023)Detecting Web-Based Attacks: A Comparative Analysis of Machine Learning and BERT Transformer Approaches., , , , and . IEA/AIE (2), volume 13926 of Lecture Notes in Computer Science, page 325-332. Springer, (2023)Integrating Non-Functional Requirements for Marginalized Users in the Design of IoT Systems (short paper)., , , , and . ACSE, volume 2689 of CEUR Workshop Proceedings, CEUR-WS.org, (2020)Visual Dialog., , , , , , , and . CVPR, page 1080-1089. IEEE Computer Society, (2017)Visual Dialog., , , , , , , , and . IEEE Trans. Pattern Anal. Mach. Intell., 41 (5): 1242-1256 (2019)A Dynamic Wireless Sensor Network Deployment Algorithm for Emergency Communications., , , , and . SERA, page 28-34. IEEE, (2023)Applying Rough Set Theory for Digital Forensics Evidence Analysis., , and . IJCRS, volume 13633 of Lecture Notes in Computer Science, page 71-84. Springer, (2022)Hand gestures recognition using edge computing system based on vision transformer and lightweight CNN., , , , and . J. Ambient Intell. Humaniz. Comput., 14 (3): 2601-2615 (March 2023)A Review of Automated Bioacoustics and General Acoustics Classification Research., , , , and . Sensors, 22 (21): 8361 (2022)EyePAD++: A Distillation-based approach for joint Eye Authentication and Presentation Attack Detection using Periocular Images., , , , , and . CoRR, (2021)