Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An incident information management framework based on data integration, data mining, and multi-criteria decision making., , , and . Decis. Support Syst., 51 (2): 316-327 (2011)Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps., , , and . IJDSN, (2019)A Black-Box External Equivalent Method Using Tie-Line Power Mutation., , , , , and . IEEE Access, (2019)A delay-based PUF design using multiplexer chains., and . ReConFig, page 1-6. IEEE, (2013)CRSF: An Intrusion Detection Framework for Industrial Internet of Things Based on Pretrained CNN2D-RNN and SVM., , , , , , and . IEEE Access, (2023)Evolutionary Recurrent Neural Architecture Search., , , , , and . IEEE Embed. Syst. Lett., 13 (3): 110-113 (2021)A local search algorithm for the k-path partition problem., , and . Optim. Lett., 18 (1): 279-290 (January 2024)Monitoring Spatiotemporal Variation of Individual Tree Biomass Using Multitemporal LiDAR Data., , , , , and . Remote. Sens., 15 (19): 4768 (October 2023)CTSF: An Intrusion Detection Framework for Industrial Internet Based on Enhanced Feature Extraction and Decision Optimization Approach., , , , and . Sensors, 23 (21): 8793 (October 2023)Smart Meters Integration in Distribution System State Estimation with Collaborative Filtering and Deep Gaussian Process., , , , , and . CoRR, (2022)