Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Heuristic Optimal Discrete Bit Allocation Algorithm for Margin Maximization in DMT Systems., , , and . EURASIP J. Adv. Signal Process., (2007)Image steganalysis algorithm based on deep learning and attention mechanism for computer communication., and . J. Electronic Imaging, (2024)Application of network link prediction in drug discovery., , , , , , , and . BMC Bioinform., 22 (1): 187 (2021)A Comprehensive Survey on Authentication and Attack Detection Schemes That Threaten It in Vehicular Ad-Hoc Networks., , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (12): 13573-13602 (December 2023)Network traffic identification in packet sampling environment., and . Digit. Commun. Networks, 9 (4): 957-970 (August 2023)A Survey on Distributed Denial of Service (DDoS) Attacks in SDN and Cloud Computing Environments., , and . IEEE Access, (2019)A survey on deep learning and its applications., , and . Comput. Sci. Rev., (2021)An Integrated Method for Tunnel Health Monitoring Data Analysis and Early Warning: Savitzky-Golay Smoothing and Wavelet Transform Denoising Processing., , , , , , and . Sensors, 23 (17): 7460 (September 2023)Energy-efficient scheme based on user task characteristic in virtual cloud platform., and . Clust. Comput., 23 (2): 1125-1135 (2020)A systematic mapping study on machine learning methodologies for requirements management., , , and . IET Softw., 17 (4): 405-423 (August 2023)