Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Normalized Cross-Correlation enhanced floating car data estimation., , and . WOCC, page 1-6. IEEE, (2011)Convolutional Neural Networks for Page Segmentation of Historical Document Images, and . (2017)cite arxiv:1704.01474.Research on Web2.0 System Design Based on CAS Theory., and . Complex (1), volume 4 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 188-195. Springer, (2009)Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model., , , , and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 44-59. Springer, (2013)Optimal Path Planning for Minimizing Disturbance of Space Robot., , and . ICARCV, page 1-6. IEEE, (2006)A novel scene text detection algorithm based on convolutional neural network., , , , , and . VCIP, page 1-4. IEEE, (2016)Internet traffic classification based on bag-of-words model., , and . GLOBECOM Workshops, page 736-741. IEEE, (2012)The utility of explicit rate-based flow control in mobile ad hoc networks., , and . WCNC, page 1921-1926. IEEE, (2004)DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks., , , and . EuroS&P, page 473-487. IEEE, (2018)Frequency Domain Trinicon-Based Blind Source Separation Method with Multi-Source Activity Detection for Sparsely Mixed Signals., , and . SAM, page 637-641. IEEE, (2018)