Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Sybil Detection via Graph Pruning and Regularization Techniques., , , and . ACML, volume 45 of JMLR Workshop and Conference Proceedings, page 189-204. JMLR.org, (2015)Verifying Distributed Controllers with Local Invariants., , , , and . QRS, page 120-131. IEEE, (2016)A bilateral rehabilitation method for arm coordination and manipulation function with gesture and haptic interfaces., , , , and . ROBIO, page 309-313. IEEE, (2015)Wave-equation traveltime inversion: Comparison of three numerical optimization methods., , and . Comput. Geosci., (2013)A Deep Learning Approach to Detection of Warping Forgery in Images., , , , and . ICAIS (2), volume 12240 of Lecture Notes in Computer Science, page 109-118. Springer, (2020)Time-dependent Cues Encode the Minimum Exploration Time in Discriminating Naturalistic Compliances., and . HAPTICS, page 22-27. IEEE, (2020)A Risk Assessment Method for Enterprise Cloud Accounting., and . ISCID (2), page 172-175. IEEE, (2019)Data Agnostic Filter Gating For Efficient Deep Networks., , , , , , , , , and . ICASSP, page 3503-3507. IEEE, (2022)Automatic Performance Testing for Image Displaying in Android Apps., , , and . APSEC, page 317-326. IEEE, (2021)Contrastive Code-Comment Pre-training., , , and . ICDM, page 398-407. IEEE, (2022)