Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-time chaotic video encryption based on multithreaded parallel confusion and diffusion., , , and . CoRR, (2023)Surrogate-assisted Phasmatodea population evolution algorithm applied to wireless sensor networks., , , and . Wirel. Networks, 29 (2): 637-655 (February 2023)NiNSRAPM: An Ensemble Learning Based Non-intrusive Network Security Risk Assessment Prediction Model., , , , and . DSC, page 17-23. IEEE, (2022)A Practical Non-Intrusive Cyber Security Vulnerability Assessment Method for Cyber-Insurance., , and . DSC, page 261-269. IEEE, (2023)Gating threshold value determination for the motion gating of positron emission tomography/computed tomography., , , , , , and . BMEI, page 189-193. IEEE, (2014)Multiplicative LSTM for sequence modelling, , , and . (2016)cite arxiv:1609.07959.Joint Uncertainty Decoding for Noise Robust Subspace Gaussian Mixture Models., , , and . IEEE Trans. Speech Audio Process., 21 (9): 1791-1804 (2013)Tree Recurrent Neural Networks with Application to Language Modeling., , and . CoRR, (2015)Continuous Streaming Multi-Talker ASR with Dual-Path Transducers., , , , and . ICASSP, page 7317-7321. IEEE, (2022)Autonomous Aerial Robot for High-Speed Search and Intercept Applications., , , , , , , , , and 3 other author(s). Field Robotics, 2 (1): 1320-1350 (March 2022)