Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Preserving Private Geosocial Networks against Practical Attacks., and . IIH-MSP, page 417-420. IEEE, (2015)Online Learning Algorithms for Train Automatic Stop Control Using Precise Location Data of Balises., , , and . IEEE Trans. Intell. Transp. Syst., 14 (3): 1526-1535 (2013)Collaborative representation with reduced residual for face recognition., , , , , and . Neural Comput. Appl., 25 (7-8): 1741-1754 (2014)Anonymizing Graphs Against Weight-based Attacks with Community Preservation., and . JCSE, 5 (3): 197-209 (2011)ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts., , , , , and . IEEE Trans. Netw. Sci. Eng., 8 (2): 1133-1144 (2021)Joint Graph Learning and Matching for Semantic Feature Correspondence., , , , , and . Pattern Recognit., (2023)On robustness of neural ODEs image classifiers., , , , and . Inf. Sci., (2023)Towards Imbalanced Image Classification: A Generative Adversarial Network Ensemble Learning Method., , , and . IEEE Access, (2020)TB-SnW: Trust-based Spray-and-Wait routing for delay-tolerant networks., , , and . J. Supercomput., 69 (2): 593-609 (2014)Detecting Anomalies in Intelligent Vehicle Charging and Station Power Supply Systems With Multi-Head Attention Models., , , and . IEEE Trans. Intell. Transp. Syst., 22 (1): 555-564 (2021)