Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis of Overlay Cognitive Wireless Networks with an Untrusted Secondary User., , , , , , , and . ICSPCC, page 1-5. IEEE, (2018)MA-NET: Multi-Scale Attention-Aware Network for Optical Flow Estimation., , and . ICASSP, page 2844-2848. IEEE, (2022)Adaptive fuzzy based three-loop composite control of subway auxiliary inverter., , , , , , and . FSKD, page 531-535. IEEE, (2012)A resampling ensemble algorithm for classification of imbalance problems., , , , and . Neurocomputing, (2014)Design of a New Seven-Dimensional Hyperchaotic Circuit and Its Application in Secure Communication., , , , , , and . IEEE Access, (2019)Stability analysis of dynamic quantized systems with data dropout and communication delay., , , and . ICCA, page 1198-1203. IEEE, (2014)Bag of Tricks for Image Classification with Convolutional Neural Networks, , , , , and . (2018)cite arxiv:1812.01187Comment: 10 pages, 9 tables, 4 figures.An integrated methodology for enterprise financial management capability evaluation based on EDAS technique and group decision making.. J. Intell. Fuzzy Syst., 46 (1): 2281-2296 (January 2024)Dive into Deep Learning., , , and . CoRR, (2021)End-to-End Optimized 360° Image Compression., , , , and . IEEE Trans. Image Process., (2022)