Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new hierarchical temporal memory based on recurrent learning unit., , , , , and . J. Exp. Theor. Artif. Intell., 35 (5): 665-678 (July 2023)On Learning Mechanical Laws of Motion From Video Using Neural Networks., , , , , and . IEEE Access, (2023)Multi-core implementation of decomposition-based packet classification algorithms., , and . J. Supercomput., 69 (1): 34-42 (2014)An Efficient Differential Privacy Logistic Classification Mechanism., , , and . IEEE Internet Things J., 6 (6): 10620-10626 (2019)Adversarial attack and defense technologies in natural language processing: A survey., , , and . Neurocomputing, (2022)Learning word representation by jointly using neighbor and syntactic contexts., , , , , and . Neurocomputing, (2021)Fast-flux attack network identification based on agent lifespan., , and . WCNIS, page 658-662. IEEE, (2010)ALTO: Alternating Latent Topologies for Implicit 3D Reconstruction., , , , , , , and . CoRR, (2022)A clone of social networks to decentralized bootstrapping P2P networks., , , and . IWQoS, page 1-2. IEEE, (2010)Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement., , , and . Comput. Stand. Interfaces, (2018)