Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Testing and Understanding Second-Order Statistics of Spike Patterns Using Spike Shuffling Methods., and . ICONIP (4), volume 10637 of Lecture Notes in Computer Science, page 602-612. Springer, (2017)Delayed Feedback-Based Suppression of Pathological Oscillations in a Neural Mass Model., , , , and . IEEE Trans. Cybern., 51 (10): 5046-5056 (2021)Synchronization in oscillatory networks, , and . Springer, Berlin, Germany, (2007)Relative clock demonstrates the endogenous heterogeneity of human dynamics, , , and . CoRR, (2011)Synchronization in complex networks, , , , and . Phys. Rep., (2008)Brain Connectivity Structure in Spinal Cord Injured: Evaluation by Graph Analysis., , , , , , , , , and 2 other author(s). EMBC, page 988-991. IEEE, (2006)Secure File Outsourcing Method Based on Consortium Blockchain., , , , , and . SmartCom, volume 13828 of Lecture Notes in Computer Science, page 371-380. Springer, (2022)Dynamic Configuration of Coactive Micropatterns in the Default Mode Network During Wakefulness and Sleep., , , , , , , , and . Brain Connect., 11 (6): 471-482 (2021)Detecting the Topology of a Neural Network from Partially Obtained Data Using Piecewise Granger Causality., , , and . ISNN (1), volume 6675 of Lecture Notes in Computer Science, page 166-175. Springer, (2011)A slice-based encryption scheme for IPFS., , , and . Int. J. Secur. Networks, 18 (1): 42-51 (2023)