Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated Multiport DC-DC and Multilevel Converters for Multiple Renewable Energy Source Integration., , , and . IEEE Access, (2023)Positive Solvability for Conjugate Fractional Differential Inclusion of (k, n - k) Type without Continuity and Compactness., and . Axioms, 10 (3): 170 (2021)Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning., , , , and . CoRR, (2019)The effect of RBCs concentration in blood on the wireless communication in Nano-networks in the THz band., and . Nano Commun. Networks, (2018)RCA-LF: Dense Light Field Reconstruction Using Residual Channel Attention Networks., , and . Sensors, 22 (14): 5254 (2022)Exploration of Semantic Label Decomposition and Dataset Size in Semantic Indoor Scenes Synthesis via Optimized Residual Generative Adversarial Networks., , and . Sensors, 22 (21): 8306 (2022)BadNL: Backdoor Attacks Against NLP Models., , , , and . CoRR, (2020)Fast Light Field Reconstruction Using Convolutional Neural Network to Double Angular Resolution., , and . ICCE, page 1-4. IEEE, (2020)MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples., , , , and . ACM Conference on Computer and Communications Security, page 259-274. ACM, (2019)A real-time Arabic avatar for deaf-mute community using attention mechanism., , , , , and . Neural Comput. Appl., 35 (29): 21709-21723 (October 2023)