Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Implementation of Android Contacts Synchronization System Based on the SyncML Protocol., and . INCoS, page 747-750. IEEE, (2013)DOA Estimation for Coherent and Incoherent Sources Based on Co-prime Array., , , , , , and . WISATS (2), volume 281 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 608-619. Springer, (2019)Fast wireless sensor for anomaly detection based on data stream in an edge-computing-enabled smart greenhouse., , , , , , and . Digit. Commun. Networks, 8 (4): 498-507 (2022)A Novel Framework for Anomaly Detection via Feature Selection and Dimensionality Reduction., , , , , and . FSDM, volume 320 of Frontiers in Artificial Intelligence and Applications, page 511-522. IOS Press, (2019)A Deep Learning Approach to Predict Neonatal Encephalopathy from Electronic Health Records., , , , and . ICHI, page 1-7. IEEE, (2019)Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning., , , , and . AAAI, page 946-953. AAAI Press, (2020)Fast Wireless Sensor Anomaly Detection based on Data Stream in Edge Computing Enabled Smart Greenhouse., , , , , , and . CoRR, (2021)DAWAR: Diversity-aware Web APIs Recommendation for Mashup Creation based on Correlation Graph., , , , , , , and . SIGIR, page 395-404. ACM, (2022)How Adversarial Assumptions Influence Re-identification Risk Measures: A COVID-19 Case Study., , , , , , , and . PSD, volume 13463 of Lecture Notes in Computer Science, page 361-374. Springer, (2022)Enabling Deep Voltage Scaling in Delay Sensitive L1 Caches., and . DSN, page 192-202. IEEE Computer Society, (2016)