Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Extended Role-Based Access Control for Web Services., , and . SECRYPT, page 471-474. INSTICC Press, (2006)Efficient Stereo Matching by Local Linear Filtering and Improved Dynamic Programming., , and . CCPR, volume 321 of Communications in Computer and Information Science, page 113-120. Springer, (2012)Lower Bounds on the Algebraic Immunity of Boolean Functions, and . CoRR, (2006)Vectorial Resilient $PC(l)$ of Order $k$ Boolean Functions from AG-Codes, , and . CoRR, (2006)Rotational Direction Detection Using Tactile Sensor and External Camera.. AIM, page 1456-1461. IEEE, (2019)A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold., , , and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 283-292. Springer, (2009)Smart NCAP supporting Low-Rate DDoS Detection for IEEE 21451-1-5 Internet of Things., , , , and . ICPS, page 532-535. IEEE, (2019)Service Popularity-Based Smart Resources Partitioning for Fog Computing-Enabled Industrial Internet of Things., , , , and . IEEE Trans. Ind. Informatics, 14 (10): 4702-4711 (2018)State-of-charge Estimation of Batteries Based on Open-circuit Voltage and Time Series Neural Network., and . ICSAI, page 257-262. IEEE, (2019)Making Big Data Intelligent Storable at the Edge: Storage Resource Intelligent Orchestration., , , , , and . GLOBECOM, page 1-6. IEEE, (2019)