Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Approach for Mining Top-Rank-k Erasable Itemsets., , , and . ACIIDS (1), volume 8397 of Lecture Notes in Computer Science, page 73-82. Springer, (2014)Instance Segmentation under Occlusions via Location-aware Copy-Paste Data Augmentation., , , , and . CoRR, (2023)A heuristics approach to mine behavioural data logs in mobile malware detection system., , , and . Data Knowl. Eng., (2018)OSSim: a generic simulation framework for overlay streaming., , and . SummerSim, page 30. Society for Computer Simulation International / ACM DL, (2013)SWAP: Protecting pull-based P2P video streaming systems from inference attacks., , , and . WoWMoM, page 1-9. IEEE Computer Society, (2016)Dynamic Functional Split Orchestration., , , and . ICTON, page 1-2. IEEE, (2024)Practical synchronization techniques for multi-channel MAC., , and . MobiCom, page 134-145. ACM, (2006)A method for detecting DGA botnet based on semantic and cluster analysis., and . SoICT, page 272-277. ACM, (2016)Building Resource Auto-scaler with Functional-Link Neural Network and Adaptive Bacterial Foraging Optimization., , and . TAMC, volume 11436 of Lecture Notes in Computer Science, page 501-517. Springer, (2019)Geospatial preprocessing for situational assessment through hydraulic simulations., , and . ICNC-FSKD, page 2429-2435. IEEE, (2017)