Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker., , , and . Decis. Anal., 19 (2): 99-122 (2022)SVD-CNN: A Convolutional Neural Network Model with Orthogonal Constraints Based on SVD for Context-Aware Citation Recommendation., , , and . Comput. Intell. Neurosci., (2020)Instance-aware Dynamic Prompt Tuning for Pre-trained Point Cloud Models., , , , , and . ICCV, page 14115-14124. IEEE, (2023)Blood Impedance Characterization from Pulsatile Measurements., and . CCECE, page 983-986. IEEE, (2006)Information security decisions of firms considering security risk interdependency., , , and . Expert Syst. Appl., (2021)How to react to hacker types and asset types in security decision-making., , , and . Expert Syst. Appl., (November 2023)Heterogeneous deep graph convolutional network with citation relational BERT for COVID-19 inline citation recommendation., , , , , and . Expert Syst. Appl., 213 (Part): 118841 (2023)CFGN: A Lightweight Context Feature Guided Network for Image Super-Resolution., , , , , and . IEEE Trans. Emerg. Top. Comput. Intell., 8 (1): 855-865 (February 2024)A generic denoising framework via guided principal component analysis., , , , , , , and . J. Vis. Commun. Image Represent., (2017)Operation State Recognition of Renewable Energy Unit Based on SSAE and Improved KNN Algorithm., , , , , and . IEEE Access, (2023)