Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulation Data Driven Design Optimization for Reconfigurable Soft Gripper System., , , , , , and . IEEE Robotics Autom. Lett., 7 (2): 5803-5810 (2022)Covert Threat Region Analysis of 3-D Location-Based Beamforming in Rician Channel., , , , and . IEEE Wirel. Commun. Lett., 11 (6): 1253-1257 (2022)Disclose or Exploit? A Game-Theoretic Approach to Strategic Decision Making in Cyber-Warfare., , , , , and . IEEE Syst. J., 14 (3): 3779-3790 (2020)Spectrum sensing and SNR walls when primary user has multiple power levels., , and . ICCC, page 1-6. IEEE, (2015)Data-based Conceptual Design of Offshore Jackets Using a Self-developed Database, , , and . (2023)Generative AI based Augmentation for Offshore Jacket Design: An Integrated Approach for Mixed Tabular Data Generation under Data Scarcity and Imbalance, , , and . Automation in Construction, (2024)Retrieval-based Full-length Wikipedia Generation for Emergent Events., , , , , , , , , and . CoRR, (2024)$DBank$DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans., , , , and . IEEE Trans. Dependable Secur. Comput., 18 (3): 1378-1393 (2021)Generating Fake Documents Using Probabilistic Logic Graphs., , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (4): 2428-2441 (2022)Intercarrier interference cancellation for wideband OFDM in high speed aerial vehicle communication., , , and . ICNC, page 23-27. IEEE Computer Society, (2013)