Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Opinion summarization for short texts based on BM25 and syntactic parsing., , , , and . INDIN, page 1177-1180. IEEE, (2016)An Evaluation of Auto Fault Diagnosis Complexity Based on Information Entropy., and . ITITS (2), volume 455 of Advances in Intelligent Systems and Computing, page 91-101. (2015)Low-Complexity Stackelberg Game Approach for Energy-Efficient Resource Allocation in Heterogeneous Networks., , and . IEEE Communications Letters, 18 (11): 2011-2014 (2014)A novel framework for SVM-based image retrieval on large databases., , , and . ACM Multimedia, page 487-490. ACM, (2005)Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512., , and . IACR Cryptology ePrint Archive, (2009)Security of Practical Cryptosystems Using Merkle-Damgard Hash Function in the Ideal Cipher Model., , , and . IACR Cryptology ePrint Archive, (2009)A novel cuckoo search algorithm with multiple update rules., , , and . Appl. Intell., 48 (11): 4192-4211 (2018)An Energy Combiner Design for Multiple Microbial Energy Harvesting Sources., and . ACM Great Lakes Symposium on VLSI, page 443-446. ACM, (2017)Adaptive Semiglobal Nonlinear Output Regulation: An Extended-State Observer Approach., and . CoRR, (2019)Topological Thouless pumping of ultracold fermions, , , , , , , and . (Jan 18, 2016)