Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Deduplication in Wireless Multimedia Monitoring Network., , , , , and . IJDSN, (2013)Research and implementation on a Trojan detection approach based on sensor path delay for golden-free chips., and . Int. J. Sens. Networks, 42 (4): 238-247 (2023)Generating Probabilistic Temporal Logic Formulas from Probabilistic Scenario-Based Specifications., , , and . TASE, page 205-208. IEEE Computer Society, (2011)Micro-Expression Recognition Base on Optical Flow Features and Improved MobileNetV2., , , and . KSII Trans. Internet Inf. Syst., 15 (6): 1981-1995 (2021)A Relaxed K-SVD Algorithm for Spontaneous Micro-Expression Recognition., , and . PRICAI, volume 9810 of Lecture Notes in Computer Science, page 692-699. Springer, (2016)Network Intrusion Detection by Using Cellular Neural Network with Tabu Search., , , and . BLISS, page 64-68. IEEE Computer Society, (2008)An Anomaly Intrusion Detection Approach Using Cellular Neural Networks., and . ISCIS, volume 4263 of Lecture Notes in Computer Science, page 908-917. Springer, (2006)Effective micro-expression recognition using relaxed K-SVD algorithm., , , and . Int. J. Machine Learning & Cybernetics, 8 (6): 2043-2049 (2017)A design strategy for real-time IoT systems based on Petri net with multi-connection and multi-task., , and . Int. J. Sens. Networks, 43 (3): 184-193 (2023)Model Checking WS-BPEL with Universal Modal Sequence Diagrams., , , and . ACIS-ICIS, page 328-333. IEEE Computer Society, (2011)