Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery., , , , , , , and . IACR Cryptol. ePrint Arch., (2023)Deep metric learning with mirror attention and fine triplet loss for fundus image retrieval in ophthalmology., , , , , , , , , and 1 other author(s). Biomed. Signal Process. Control., 80 (Part): 104277 (2023)Modeling and analysis for group delay mismatch effect on wideband adaptive spatial interference cancellation., , , , , , and . EURASIP J. Adv. Signal Process., 2023 (1): 96 (December 2023)On Algorithms for Enumerating Subtrees of Hexagonal and Phenylene Chains., , , , and . Comput. J., 60 (5): 690-710 (2017)A New Rough Set Reduct Algorithm Based on Particle Swarm Optimization., , , and . IWINAC (1), volume 4527 of Lecture Notes in Computer Science, page 397-406. Springer, (2007)Turbulent Particle Swarm Optimization Using Fuzzy Parameter Tuning., and . Foundations of Computational Intelligence (3), volume 203 of Studies in Computational Intelligence, Springer, (2009)Modeling of Accurately Predicting the Cavopulmonary Pressure Head in Fontan Blood Pump using Neural Network., , , , , , , and . ICCA, page 915-620. IEEE, (2022)A Novel Access Control Strategy for Distributed Data Systems., , , and . J. Digit. Inf. Manag., 8 (5): 291-297 (2010)A fuzzy matching approach for design pattern mining., , , and . J. Intell. Fuzzy Syst., 23 (2-3): 53-60 (2012)Fast and practical secret key extraction by exploiting channel response., , , and . INFOCOM, page 3048-3056. IEEE, (2013)