Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Students’ Developing Knowledge in a Subject Discipline: Insights from Combining Quantitative and Qualitative Methods, , , and . International Journal of Social Research Methodology, 8 (3): 225-238 (2005)Congestion Control Strategy for Opportunistic Network Based on Message Values., , and . J. Networks, 9 (5): 1132-1138 (2014)Interactive knowledge-enhanced attention network for answer selection., , and . Neural Comput. Appl., 32 (15): 11343-11359 (2020)Invetter: Locating Insecure Input Validations in Android Services., , , , , , , and . ACM Conference on Computer and Communications Security, page 1165-1178. ACM, (2018)Template Attacks Based on the Multivariate Joint Distribution., , , and . IACR Cryptol. ePrint Arch., (2020)Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation., , , , , , , , , and . CoRR, (2016)Adaptive Discrete ZND Models for Tracking Control of Redundant Manipulator., , , and . IEEE Trans. Ind. Informatics, 16 (12): 7360-7368 (2020)The evolutionary design of trace form bent functions in cryptography., , and . Int. J. Inf. Comput. Secur., 3 (1): 47-59 (2009)TDACS: an ABAC and Trust-based Dynamic Access Control Scheme in Hadoop.. CoRR, (2020)Building Typification in Map Generalization Using Affinity Propagation Clustering., , , , and . ISPRS Int. J. Geo Inf., 10 (11): 732 (2021)