Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Self-constructing Compensatory Fuzzy Wavelet Network and Its Applications., , and . FSKD (1), volume 3613 of Lecture Notes in Computer Science, page 743-756. Springer, (2005)Intelligent Fault Diagnosis for Bearings of Industrial Robot Joints Under Varying Working Conditions Based on Deep Adversarial Domain Adaptation., , , , , and . IEEE Trans. Instrum. Meas., (2022)Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks., , , , , , , and . Sensors, 19 (11): 2440 (2019)Particle Filtering Based Remaining Useful Life Prediction for Electromagnetic Coil Insulation., , , , , , and . Sensors, 21 (2): 473 (2021)Edge Intelligence based Co-training of CNN., , , , , and . ICCSE, page 830-834. IEEE, (2019)A Survey: Machine Learning Based Security Analytics Approaches and Applications of Blockchain in Network Security., , , , , , and . SmartBlock, page 17-22. IEEE, (2020)An Improved Model Free Adaptive Control Algorithm., , , and . ICNC (1), page 70-74. IEEE Computer Society, (2009)SIL verification for SRS with diverse redundancy based on system degradation using reliability block diagram., , , and . Reliab. Eng. Syst. Saf., (2017)Assessing the Feasibility of Game-Theory-Based Demand Response Management by Practical Implementation., , , , , , and . IEEE Access, (2021)Finding Gold in the Sand: Identifying Anomaly Indicators Though Huge Amount Security Logs., , , , , and . BigDataSecurity/HPSC/IDS, page 140-144. IEEE, (2020)