Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A learning approach for performance evaluation of local network., , and . IEEE Congress on Evolutionary Computation, page 608-614. IEEE, (2003)A Lightweight Encryption Algorithm for Mobile Online Multimedia Devices., , and . WISE, volume 3306 of Lecture Notes in Computer Science, page 653-658. Springer, (2004)Multimedia authentication with sensor-based watermarking., , and . MM&Sec, page 155-159. ACM, (2004)Interpretable Deep Reinforcement Learning for Optimizing Heterogeneous Energy Storage Systems., , , , , , and . IEEE Trans. Circuits Syst. I Regul. Pap., 71 (2): 910-921 (February 2024)Graph Reinforcement Learning for Securing Critical Loads by E-Mobility., , , , , and . ICONIP (7), volume 1961 of Communications in Computer and Information Science, page 303-314. Springer, (2023)Distributionally Robust Framework and its Approximations Based on Vector and Region Split for Self-Scheduling of Generation Companies., , , and . IEEE Trans. Ind. Informatics, 18 (8): 5231-5241 (2022)Guide Subspace Learning for Unsupervised Domain Adaptation., , , , , and . IEEE Trans. Neural Networks Learn. Syst., 31 (9): 3374-3388 (2020)Quantum k-means algorithm based on trusted server in quantum cloud computing., , , and . Quantum Inf. Process., 20 (4): 130 (2021)Decomposition-based scheduling algorithm for large-scale job shop., , , and . ICIA, page 124-127. IEEE, (2013)On the Solution Uniqueness of Data-Driven Modeling of Flexible Loads., , , , , , and . CoRR, (2024)