Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

STA-Net: spatial-temporal attention network for video salient object detection., , , , and . Appl. Intell., 51 (6): 3450-3459 (2021)Atomically thin resonant tunnel diodes built from synthetic van der Waals heterostructures, , , , , , , , , and 1 other author(s). Nature communications, (2015)IETF IoT based wireless communication for latency-sensitive use cases in building automation., , , and . ISIE, page 1168-1173. IEEE, (2016)Nanostructural insights into the dissolution behavior of Sr-doped hydroxyapatite, , , , , , and . Journal of the European Ceramic Society, 38 (16): 5554-5562 (2019)A Novel Engine for Various Intrusion Detection Methods., and . ACISP, volume 1841 of Lecture Notes in Computer Science, page 255-265. Springer, (2000)Extremal Graphs for Blow-Ups of Keyrings., , , and . Graphs Comb., 36 (6): 1827-1853 (2020)Research on defect detection of improved target detection algorithm on the image surface of 5G communication ring.. Int. J. Model. Simul. Sci. Comput., 14 (1): 2341011:1-2341011:15 (February 2023)A Semantic-Preserving Scheme to Trajectory Synthesis Using Differential Privacy., , , , , and . IEEE Internet Things J., 10 (15): 13784-13797 (August 2023)Efficient and Privacy-Preserving Polygons Spatial Query Framework for Location-Based Services., , and . IEEE Internet Things J., 4 (2): 536-545 (2017)Duth: a user-friendly dual-factor authentication for Android smartphone devices., , , and . Secur. Commun. Networks, 8 (7): 1213-1222 (2015)