Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An internal model frame-based disturbance attenuation control scheme for quad-rotors transporting unknown payloads., , , and . Trans. Inst. Meas. Control, 41 (14): 3991-4000 (2019)Network Anomalous Intrusion Detection using Fuzzy-Bayes., , , and . Intelligent Information Processing, volume 228 of IFIP, page 525-530. Springer, (2006)Co-occurrence semantic knowledge base construction for abbreviation disambiguation., , , , and . IALP, page 326-329. IEEE, (2017)Autonomous and Cost-effective Defect Detection System for Molded Pulp Products., , , , , , and . ICCPS, page 1-11. ACM, (2023)VaRSM: Versatile Autonomous Racquet Sports Machine., , , , , and . ICCPS, page 203-214. IEEE, (2022)Research on Off-Path Exploits of Network Protocols., , , , , and . DMBD (1), volume 1453 of Communications in Computer and Information Science, page 73-80. Springer, (2021)A Bayesian Computational Cognitive Model., , and . NeSy, volume 230 of CEUR Workshop Proceedings, CEUR-WS.org, (2007)A Novel Plausible Model for Visual Perception., , and . IEEE ICCI, page 19-24. IEEE Computer Society, (2006)A simple yet effective method for summarizing microblogging users with their representative tweets., , , , and . IALP, page 310-313. IEEE, (2017)Bring Event into RGB and LiDAR: Hierarchical Visual-Motion Fusion for Scene Flow., , , and . CoRR, (2024)