Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Direct Batch Growth Hierarchical Self-Organizing Mapping Based on Statistics for Efficient Network Intrusion Detection., , , , , , , , and . IEEE Access, (2020)Multiuser access control searchable privacy-preserving scheme in cloud storage., , , , , , and . Int. J. Commun. Syst., (2018)New 2-designs from strong difference families., , and . Finite Fields Their Appl., (2018)Area-Based CFAR Target Detection for Automotive Millimeter-Wave Radar., , , , and . IEEE Trans. Veh. Technol., 72 (3): 2891-2906 (March 2023)Contract strategies in competitive supply chains subject to inventory inaccuracy., , , , and . Ann. Oper. Res., 309 (2): 641-661 (2022)A survey of two-dimensional scheduling., , , and . Int. J. Manuf. Res., 9 (2): 194-222 (2014)Determinant on RFID technology investment for dominant retailer subject to inventory misplacement., , , and . ITOR, 27 (2): 1058-1079 (2020)Coupling effect and pole assignment in trajectory regulation of multi-agent systems., , , and . Autom., (2021)The future of Artificial Intelligence in Cybersecurity: A Comprehensive Survey., , and . EAI Endorsed Trans. Creative Technol., 8 (28): e3 (2021)Simulation Implementation and Verification of a Security Framework for ICS Based on SPD., , , , and . Autom. Control. Comput. Sci., 57 (1): 37-47 (February 2023)