Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Billing Attacks on SIP-Based VoIP Systems., , , and . WOOT, USENIX Association, (2007)Multiple Key-value Strategy in Recommendation Systems Incorporating Large Language Model., , , , , and . CoRR, (2023)An Online Adaptive Network Anomaly Detection Model., , , , and . CSO (2), page 365-368. IEEE Computer Society, (2009)978-0-7695-3605-7.TrafficSCINet: An Adaptive Spatial-Temporal Graph Convolutional Network for Traffic Flow Forecasting., , , , and . ICIC (1), volume 14086 of Lecture Notes in Computer Science, page 628-639. Springer, (2023)Driver's Gaze Zone Estimation Method: A Four-channel Convolutional Neural Network Model., , and . BDSIC, page 20-24. ACM, (2020)An integrated inverse space sparse representation framework for tumor classification., , , , , , and . Pattern Recognit., (2019)Bio-Inspired PHM Model for Diagnostics of Faults in Power Transformers Using Dissolved Gas-in-Oil Data., , , , and . Sensors, 19 (4): 845 (2019)Fault Diagnosis in Chemical Processes Based on Class-Incremental FDA and PCA., , , , , and . IEEE Access, (2019)Passive diagnosis for wireless sensor networks., , , and . SenSys, page 371-372. ACM, (2008)A zero-knowledge-proof-based digital identity management scheme in blockchain., and . Comput. Secur., (2020)