Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BIDS: Bridgehead-Employed Image Distribution System for Cloud Data Centers., , , , , , and . NPC, volume 8707 of Lecture Notes in Computer Science, page 269-280. Springer, (2014)Multi-Frame Content Integration with a Spatio-Temporal Attention Mechanism for Person Video Motion Transfer., , , , and . CoRR, (2019)CANeleon: Protecting CAN Bus With Frame ID Chameleon., , , , , and . IEEE Trans. Veh. Technol., 69 (7): 7116-7130 (2020)Full Encryption: An end to end encryption mechanism in GaussDB., , , and . Proc. VLDB Endow., 14 (12): 2811-2814 (2021)Prior guided conditional generative adversarial network for single image dehazing., , , , , and . Neurocomputing, (2021)Framelet block thresholding estimator for sparse functional data., , and . J. Multivar. Anal., (2022)Software Defect Prediction based on JavaBERT and CNN-BiLSTM., and . IWESQ/QuASoQ@APSEC, volume 3612 of CEUR Workshop Proceedings, page 51-59. CEUR-WS.org, (2023)Detecting Missing-Permission-Check Vulnerabilities in Distributed Cloud Systems., , , , and . CCS, page 2145-2158. ACM, (2022)Evaluation Model Analysis of the Control Efficiency of Environmental Resource Regulation., and . JCAI, page 788-793. IEEE Computer Society, (2009)Android-SRV: Scenario-Based Runtime Verification of Android Applications., , and . Int. J. Softw. Eng. Knowl. Eng., 28 (2): 239-257 (2018)