Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

"Friend is Treasure": Exploring and Exploiting Mobile Social Contacts for Efficient Task Offloading., , , , , , and . IEEE Trans. Vehicular Technology, 65 (7): 5485-5496 (2016)WalkieLokie: Relative Positioning for Augmented Reality Using a Dummy Acoustic Speaker., , , , , and . CoRR, (2015)D2F: discriminative dense fusion of appearance and motion modalities for end-to-end video classification., , , , and . Multim. Tools Appl., 81 (9): 12157-12176 (2022)Convergence of Batch Gradient Method Based on the Entropy Error Function for Feedforward Neural Networks., and . Neural Process. Lett., 52 (3): 2687-2695 (2020)Multi-strategy adaptive cuckoo search algorithm for numerical optimization., and . Artif. Intell. Rev., 56 (3): 2031-2055 (March 2023)An efficient compressive data gathering routing scheme for large-scale wireless sensor networks., , , , and . Comput. Electr. Eng., 39 (6): 1935-1946 (2013)Accurate Indoor Localization Using Acoustic Direction Finding via Smart Phones., , , , , , and . CoRR, (2013)Using an SQP Algorithm to Choose the Feature Set for Data Field Clustering., , and . Smart Comput. Rev., 3 (4): 210-219 (2013)Limiting Privacy Breaches in Average-Distance Query., , , , and . Secur. Commun. Networks, (2020)AppAngio: Revealing Contextual Information of Android App Behaviors by API-Level Audit Logs., , , , and . IEEE Trans. Inf. Forensics Secur., (2021)