Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Path-Counter Method for Fault-Tolerant Minimal Routing Algorithms in 2D Mesh., , , and . J. Circuits Syst. Comput., 27 (4): 1850054:1-1850054:22 (2018)Robust level set image segmentation algorithm using local correntropy-based fuzzy c-means clustering with spatial constraints., , , , and . Neurocomputing, (2016)Adversarial AutoAugment., , , and . CoRR, (2019)Permutation trinomials over finite fields with even characteristic., , , , and . CoRR, (2014)Ammeter Inspection With Densely Connected Object Detection Network., , , , , and . ICSAI, page 345-349. IEEE, (2019)Efficient cooperative compressive spectrum sensing by identifying multi-candidate and exploiting deterministic matrix., , , and . EURASIP J. Adv. Signal Process., (2015)Flexible revocation and verifiability for outsourced Private Set Intersection computation., , , , and . J. Inf. Secur. Appl., (March 2023)Secure data stream outsourcing with publicly verifiable integrity in cloud storage., , , and . J. Inf. Secur. Appl., (2019)SP2LSTM: a patch learning-based electrical load forecasting for container terminal., , , , , , and . Neural Comput. Appl., 35 (30): 22651-22669 (October 2023)A Robust Image Copy Detection Method Based On Feature Extraction Algorithm., , , , and . J. Inf. Hiding Multim. Signal Process., 7 (5): 1136-1146 (2016)