Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preface., , , , , and . J. Comput. Sci. Technol., 37 (1): 1-3 (2022)SafeDrive: Online Driving Anomaly Detection From Large-Scale Vehicle Data., , , , , and . IEEE Trans. Ind. Informatics, 13 (4): 2087-2096 (2017)A Novel Tent-Levy Fireworks Algorithm for the UAV Task Allocation Problem Under Uncertain Environment., , , , , and . IEEE Access, (2022)Program-input generation for testing database applications using existing database states., , and . Autom. Softw. Eng., 22 (4): 439-473 (2015)Positioning optimisation based on particle quality prediction in wireless sensor networks., , , , , , and . IET Networks, 8 (2): 107-113 (2019)Fast and efficient face detector based on large kernel attention for CPU device., , , and . J. Real Time Image Process., 20 (4): 72 (August 2023)Exploring Structure Incentive Domain Adversarial Learning for Generalizable Sleep Stage Classification., , , , , and . ACM Trans. Intell. Syst. Technol., 15 (1): 14:1-14:30 (February 2024)A Self-Learning Fault Diagnosis Strategy Based on Multi-Model Fusion., , , , and . Inf., 10 (3): 116 (2019)A semantically secure public key cryptoscheme using bit-pair shadows., , , and . Theor. Comput. Sci., (2016)Fast password recovery attack: application to APOP., , , , and . J. Intell. Manuf., 25 (2): 251-261 (2014)