Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated topology control and routing in wireless optical mesh networks., , , , and . Comput. Networks, 51 (15): 4237-4251 (2007)Detection of Cyber-Attacks in Automotive Traffic Using Macroscopic Models and Gaussian Processes., , and . IEEE Control. Syst. Lett., (2022)CRNN-based UAV Detection using Acoustic Signature., , and . iSES, page 186-190. IEEE, (2023)Detection of Copy-move Image forgery using SVD and Cuckoo Search Algorithm., , and . CoRR, (2017)Relay placement for fault tolerance in wireless networks in higher dimensions., , and . Comput. Geom., 44 (4): 206-215 (2011)Robust Detection of Copy-Move Forgery Based on Wavelet Decomposition and Firefly Algorithm., , and . Comput. J., 65 (4): 983-996 (2022)Robust design of wireless networks.. University of Maryland, College Park, MD, USA, (2006)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/4118).Design and test of biologically inspired multi-fiber Hydro Muscle actuated ankle., , , , , and . ARSO, page 1-7. IEEE, (2017)Stability Analysis of Two-Species PDE Traffic Models in Cyber-Attack Scenarios., , and . CDC, page 3330-3336. IEEE, (2021)An Evaluation of Digital Image Forgery Detection Approaches., , , and . CoRR, (2017)