Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding the Evolution of Android App Vulnerabilities., , , , and . IEEE Trans. Reliab., 70 (1): 212-230 (2021)Optimized energy management for plug-in hybrid vehicles with predicted driving cycles1., , , and . J. Intell. Fuzzy Syst., 46 (3): 6399-6409 (March 2024)A novel cluster ensemble approach effected by subspace similarity., , , , , and . Intell. Data Anal., 20 (3): 561-574 (2016)Co-Displayed Items Aware List Recommendation., , , , , , and . IEEE Access, (2020)Robust Dry Bulk Fleet Route Optimization Under Navigation Risk Consideration., and . IEEE Access, (2021)Adaptive Distributed Intrusion Detection Using Parametric Model., , , and . Web Intelligence, page 675-678. IEEE Computer Society, (2009)Remote Sensing Inversion of Tobacco SPAD Based on UAV Hyperspectral Imagery., , , , , , , , , and 1 other author(s). IGARSS, page 3478-3481. IEEE, (2023)EPI-based Oriented Relation Networks for Light Field Depth Estimation., , , , and . BMVC, BMVA Press, (2020)Probabilistic Word Classification Based on Context-Sensitive Binary Tree Method., and . VLC, (1997)A Scalable Algorithm for Detecting Community Outliers in Social Networks., , and . WAIM, volume 7418 of Lecture Notes in Computer Science, page 434-445. Springer, (2012)