Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Two-stage Comparative Life Cycle Assessment of Paper-based and Software-based Business Cards., , , and . ANT/SEIT, volume 52 of Procedia Computer Science, page 819-826. Elsevier, (2015)Seamless authentication for online teaching and meeting., and . BigMM, page 120-124. IEEE, (2020)Towards Seamless Authentication for Zoom-Based Online Teaching and Meeting., and . CoRR, (2020)Distortion-free Watermarking Scheme for Compressed Data in Columnar Database., , and . ICETE (2), page 343-353. SciTePress, (2018)Toward watermarking compressed data in columnar database architectures., , and . Secur. Priv., (2020)Image-Hashing-Based Anomaly Detection for Privacy-Preserving Online Proctoring., , and . CoRR, (2021)Enable people to identify science news based on retracted articles on social media., , and . CoRR, (2023)Hotspots Recommender: Spatio-Temporal Prediction of Ride-Hailing and Taxicab Services., , and . WISE, volume 13724 of Lecture Notes in Computer Science, page 81-94. Springer, (2022)Supervised Learning-Based Indoor Positioning System Using WiFi Fingerprints., , , , , and . ACR, volume 700 of Lecture Notes in Networks and Systems, page 56-71. Springer, (2023)Dissemination of Fact-Checked News Does Not Combat False News: Empirical Analysis., , , and . WISE, volume 14306 of Lecture Notes in Computer Science, page 122-133. Springer, (2023)