Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Block-DEF: A secure digital evidence framework using blockchain., , , , and . Inf. Sci., (2019)A Comparison of Machine Learning Algorithms for Detecting XSS Attacks., , , and . ICAIS (4), volume 11635 of Lecture Notes in Computer Science, page 214-224. Springer, (2019)Research on SQL Injection and Defense Technology., , , and . ICAIS (4), volume 11635 of Lecture Notes in Computer Science, page 191-201. Springer, (2019)End-to-end Speech Recognition with Adaptive Computation Steps., , and . ICASSP, page 6246-6250. IEEE, (2019)Answering the Min-Cost Quality-Aware Query on Multi-sources in Sensor-Cloud Systems., , , and . SpaCCS, volume 11342 of Lecture Notes in Computer Science, page 156-165. Springer, (2018)Honeypot Identification in Softwarized Industrial Cyber-Physical Systems., , , , , and . IEEE Trans. Ind. Informatics, 17 (8): 5542-5551 (2021)Self-regularised Minimum Latency Training for Streaming Transformer-based Speech Recognition., , and . INTERSPEECH, page 2088-2092. ISCA, (2022)Transformer-Based Online Speech Recognition with Decoder-end Adaptive Computation Steps., , and . SLT, page 1-7. IEEE, (2021)Efficient Duplicate Record Detection Based on Similarity Estimation., , , and . WAIM, volume 6184 of Lecture Notes in Computer Science, page 595-607. Springer, (2010)Quality-Aware Query Based on Relative Source Quality., , , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 3-8. Springer, (2018)