Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-Layer Network Lifetime Maximization in Underwater Wireless Sensor Networks., , , and . IEEE Syst. J., 14 (1): 220-231 (2020)Depression recognition based on dynamic facial and vocal expression features using partial least square regression., , , , , and . AVEC@ACM Multimedia, page 21-30. ACM, (2013)Blockchain-Based Secure and Trustworthy Internet of Things in SDN-Enabled 5G-VANETs., , , and . IEEE Access, (2019)IntegratedMap: a Web interface for integrating genetic map data., , and . Bioinform., 21 (9): 2126-2127 (2005)Normalization of face illumination with photorealistic texture via deep image prior synthesis., , , , and . Neurocomputing, (2020)Efficient kd-tree construction for ray tracing using ray distribution sampling., , , , and . Multimedia Tools Appl., 75 (23): 15881-15899 (2016)Learning Face Age Progression: A Pyramid Architecture of GANs., , , and . CoRR, (2017)An image-based facial acupoint detection approach using high-resolution network and attention fusion., , , and . IET Biom., 12 (3): 146-158 (May 2023)Network security situation assessment with network attack behavior classification., , , and . Int. J. Intell. Syst., 37 (10): 6909-6927 (2022)Wireless Network Intrusion Detection Based on Improved Convolutional Neural Network., and . IEEE Access, (2019)