Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Reconfiguration Algorithm: Dynamically Tuning Multiple Buffer Pools., , , , and . DEXA, volume 1873 of Lecture Notes in Computer Science, page 92-101. Springer, (2000)A trust routing protocol based on D-S evidence theory in mobile ad hoc network., , , and . ICCC, page 786-790. IEEE, (2014)Transmit signal design for optimal deconvolution., and . ICASSP (2), page 553-556. IEEE, (2004)The Influence of Time-delay for the Bifurcation of the Fractional Neuron Network., , , and . ICSAI, page 821-826. IEEE, (2019)SwiftAvatar: Efficient Auto-Creation of Parameterized Stylized Character on Arbitrary Avatar Engines., , , , , , , , , and 1 other author(s). AAAI, page 6101-6109. AAAI Press, (2023)Multimodality sensing for eating recognition., , , , , and . PervasiveHealth, page 130-137. ACM, (2016)Enpublic Apps: Security Threats Using iOS Enterprise and Developer Certificates., , , , and . AsiaCCS, page 463-474. ACM, (2015)POP and PUSH: Demystifying and Defending against (Mach) Port-oriented Programming., , , , and . NDSS, The Internet Society, (2021)M4D: A Malware Detection Method Using Multimodal Features., , , , and . FCS, volume 1105 of Communications in Computer and Information Science, page 228-238. Springer, (2019)Face Liveness Verification Based on Hyperspectrum Analysis., , and . AINA Workshops, page 612-615. IEEE Computer Society, (2017)