Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Method for Fitting Large Data Sets Using T-Splines., and . SIAM J. Sci. Comput., (2013)Study on Secrecy Capacity of Wireless Sensor Networks in Internet of Things Based on the Amplify-and-Forward Compressed Sensing Scheme., , , , , , and . IEEE Access, (2019)FMDiv: Functional Module Division on Binary Malware for Accurate Malicious Code Localization., , , , , , and . CSCWD, page 947-952. IEEE, (2023)Face Recognition Based on Curvefaces., , , , and . ICNC (2), page 627-631. IEEE Computer Society, (2007)Developing an Interactive Web-Based Programming Platform for Learning Computer Networking Protocols., , , and . SimuTools (1), volume 369 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 611-625. Springer, (2020)PDE-Based Optimal Strategy for Unconstrained Online Learning., , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 26085-26115. PMLR, (2022)Forest Parameter Mapping based on Lidar and SAR Data., , , , and . IGARSS (5), page 304-307. IEEE, (2009)Semidefinite relaxation based beamforming in clustered cooperative multicell MISO systems., , and . ICC, page 5635-5639. IEEE, (2013)Digital Image Watermark Algorithm in the Curvelet Domain., , , , and . IIH-MSP, page 105-108. IEEE Computer Society, (2006)DARKFLEECE: Probing the Dark Side of Android Subscription Apps., , , , and . USENIX Security Symposium, USENIX Association, (2024)