Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding Factors Influencing Users' Retweeting Behavior - A Theoretical Perspective., and . AMCIS, Association for Information Systems, (2013)Object technology software selection: a case study., and . Ann. Oper. Res., 185 (1): 5-24 (2011)A Novel On-Demand Password Scheme Based on BAN Logic., , , and . J. Inf. Hiding Multim. Signal Process., 7 (3): 475-488 (2016)Provably Secure and Password-Authenticated Hybrid Key Agreement Protocol in Two-realm with Privacy-Protection., , , and . J. Inf. Hiding Multim. Signal Process., 9 (4): 775-784 (2018)Deep neural network ensembles for detecting self-admitted technical debt., , , , and . J. Intell. Fuzzy Syst., 43 (1): 93-105 (2022)A Nonoverlapping Sampling Approach With Peak Data Utilization for Hyperspectral Classification., , , , , and . IEEE Geosci. Remote. Sens. Lett., (2024)Smart PV Inverter Cyberattack Detection Using Hardware-in-the-Loop Test Facility., , , , , and . IEEE Access, (2023)Genes associated with gray matter volume alterations in schizophrenia., , , , , , , , , and 1 other author(s). NeuroImage, (2021)Diminishing downsides of Data Mining., , and . Int. J. Bus. Intell. Data Min., 2 (2): 177-196 (2007)The effect of spinning missile on the position calculating of the reticle infrared detecting system., , , , and . EMEIT, page 1054-1057. IEEE, (2011)