Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Malicious behaviour classification in web logs based on an improved Xgboost algorithm., , , and . Int. J. Web Eng. Technol., 13 (4): 334-362 (2018)Latency Minimization for Multiuser Computation Offloading in Fog-Radio Access Networks., , , and . CoRR, (2019)Small-time local controllability of spacecraft attitude using control moment gyros., , and . Autom., (2015)I-CIFA: An improved collusive interest flooding attack in named data networking., , , and . J. Inf. Secur. Appl., (2021)Adaptive Condition Monitoring for Fuel Cells Based on Fast EIS and Two-Frequency Impedance Measurements., , , and . IEEE Trans. Ind. Electron., 70 (8): 8517-8525 (August 2023)Multi-Task Deep Learning With Dynamic Programming for Embryo Early Development Stage Classification From Time-Lapse Videos., , , , , , , , and . IEEE Access, (2019)Infrared Pedestrian Tracking With Graph Memory Features., , and . IEEE Signal Process. Lett., (2021)A Novel Auto-Synthesis Dataset Approach for Fitting Recognition Using Prior Series Data., , , , , , , , and . Sensors, 22 (12): 4364 (2022)AQMDRL: Automatic Quality of Service Architecture Based on Multistep Deep Reinforcement Learning in Software-Defined Networking., , , , , , and . Sensors, 23 (1): 429 (2023)Towards understanding residential privacy by analyzing users' activities in foursquare., , and . BADGERS@CCS, page 25-32. ACM, (2012)