Author of the publication

Intelligent Security for Inter-space Surveillance Applications.

, , , and . MUE, page 419-422. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rating Augmentation with Generative Adversarial Networks towards Accurate Collaborative Filtering., , , and . WWW, page 2616-2622. ACM, (2019)Unsupervised detection of obfuscated diverse attacks in recommender systems., and . RACS, page 40-45. ACM, (2014)Efficient processing of large-scale sparse matrix-matrix multiplications on a single machine., , , , and . SMC, page 1908-1913. IEEE, (2017)Effective dimensionality reduction in multimedia applications., , , and . CIIP, page 82-87. IEEE, (2009)On combining text-based and link-based similarity measures for scientific papers., , and . RACS, page 111-115. ACM, (2013)Data mining in intelligent SSD: Simulation-based evaluation., , , and . BigComp, page 123-128. IEEE Computer Society, (2016)Type-2 micro virtual machine monitor for ARM-based mobile systems., , , and . ICIS, page 565-566. IEEE Computer Society, (2013)An Architecture for Virtualization-Based Trusted Execution Environment on Mobile Devices., , and . UIC/ATC/ScalCom, page 540-547. IEEE Computer Society, (2014)No, That's Not My Feedback: TV Show Recommendation Using Watchable Interval., , , , and . ICDE, page 316-327. IEEE, (2019)Design and Implementation of the Concurrency Control Manager in the Main-Memory DBMS Tachyon., , and . COMPSAC, page 635-644. IEEE Computer Society, (2002)