Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Iterated multilevel simulated annealing for large-scale graph conductance minimization., , , and . Inf. Sci., (2021)Real-time continuous detection and recognition of dynamic hand gestures in untrimmed sequences based on end-to-end architecture with 3D DenseNet and LSTM., , , , and . Multim. Tools Appl., 83 (6): 16275-16312 (February 2024)One-shot learning hand gesture recognition based on modified 3d convolutional neural networks., , , , and . Mach. Vis. Appl., 30 (7-8): 1157-1180 (2019)An Architecture of System of Systems (SoS) for Commercial Flight Security in 5G OGCE., , , and . ICSAI, page 288-293. IEEE, (2018)Combinatorial Turbofan Engine Agent and Short Take-off and Vertical Landing (STOVL) Aircraft in 5G OGCE., , , and . ICSAI, page 1571-1576. IEEE, (2019)Editorial., , , , , , , and . Comput. methods Biomech. Biomed. Eng. Imaging Vis., 7 (3): 241 (2019)Fast 3D Human Pose Estimation Using RF Signals., , , , , , and . ICASSP, page 1-5. IEEE, (2023)Coverage Estimation of Wireless Network Using Attention U-Net., , , , , , , , and . TrustCom, page 1255-1260. IEEE, (2022)"How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Malware Detector., and . BigDataSecurity/HPSC/IDS, page 194-199. IEEE, (2022)PhilaeX: Explaining the Failure and Success of AI Models in Malware Detection., and . IoTBDS, page 37-46. SCITEPRESS, (2022)