Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint lp- and l2, p-norm minimization for subspace clustering with outlier pursuit., , , and . IJCNN, page 3658-3665. IEEE, (2016)A soft label based linear discriminant analysis for semi-supervised dimensionality reduction., , and . IJCNN, page 1-8. IEEE, (2013)Learning from local and global discriminative information for semi-supervised dimensionality reduction., , and . IJCNN, page 1-8. IEEE, (2013)Automated modeling of nonlinear systems using fuzzy modular neural network., , and . J. Intell. Fuzzy Syst., 46 (2): 3605-3621 (February 2024)Revenue sharing in the closed-loop supply chain: A new cooperative game theoretic approach., and . ICMLC, page 1141-1146. IEEE, (2010)Two algorithms for minimum 2-connected r-hop dominating set., and . Inf. Process. Lett., 110 (22): 986-991 (2010)N-gram nearest neighbor algorithm for voice password system., , , and . ICASSP, page 4438-4441. IEEE, (2010)Microarchitectural Protection Against Stack-Based Buffer Overflow Attacks., , and . IEEE Micro, 26 (4): 62-71 (2006)Label propagation and soft-similarity measure for graph based Constrained Semi-Supervised Learning., , and . IJCNN, page 2927-2934. IEEE, (2014)Abnormal reward and punishment sensitivity associated with Internet addicts, , , , , , and . Computers in Human Behavior, (October 2017)