Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel log-based relevance feedback technique in content-based image retrieval., and . ACM Multimedia, page 24-31. ACM, (2004)A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception., , , and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 727-730. Springer, (2005)Security Modeling and Evaluation for the Mobile Code Paradigm., and . ASIAN, volume 1742 of Lecture Notes in Computer Science, page 371-372. Springer, (1999)CRaDLe: Deep code retrieval based on semantic Dependency Learning., , , , , , and . Neural Networks, (2021)Layered obfuscation: a taxonomy of software obfuscation techniques for layered security., , , and . Cybersecur., 3 (1): 9 (2020)Textout: Detecting Text-Layout Bugs in Mobile Apps via Visualization-Oriented Learning., , , , and . ISSRE, page 239-249. IEEE, (2019)Loghub: A Large Collection of System Log Datasets for AI-driven Log Analytics., , , , and . ISSRE, page 355-366. IEEE, (2023)MatchSim: a novel neighbor-based similarity measure with maximum neighborhood matching., , and . CIKM, page 1613-1616. ACM, (2009)Few Shot Network Compression via Cross Distillation., , , and . AAAI, page 3203-3210. AAAI Press, (2020)Diversifying Query Suggestion Results., , and . AAAI, page 1399-1404. AAAI Press, (2010)