Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classification of ransomware families with machine learning based on N-gram of opcodes., , , , , and . Future Gener. Comput. Syst., (2019)Guest Editorial: Special Section on Emerging Privacy and Security Issues Brought by Artificial Intelligence in Industrial Informatics., , , , and . IEEE Trans. Ind. Informatics, 16 (3): 2029-2030 (2020)A Channel-Aware Duty Cycle Optimization for Node-to-Node Communications in the Internet of Medical Things., , , and . Int. J. Parallel Program., 48 (2): 264-279 (2020)Spatial and semantic convolutional features for robust visual object tracking., , , , and . Multim. Tools Appl., 79 (21-22): 15095-15115 (2020)Image caption generation with high-level image features., , , , and . Pattern Recognit. Lett., (2019)Energy-Efficient and Trustworthy Data Collection Protocol Based on Mobile Fog Computing in Internet of Things., , , , and . IEEE Trans. Ind. Informatics, 16 (5): 3531-3539 (2020)Attention-Based Adaptive Memory Network for Recommendation With Review and Rating., , , , and . IEEE Access, (2020)Hybrid Reasoning-based Privacy-Aware Disease Prediction Support System., , , , and . Comput. Electr. Eng., (2019)Multi-technique object tracking approach- A reinforcement paradigm., , , and . Comput. Electr. Eng., (2018)Meta-heuristic framework: Quantum inspired binary grey wolf optimizer for unit commitment problem., , , , , and . Comput. Electr. Eng., (2018)