Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A proof theory of right-linear (omega-)grammars via cyclic proofs., and . CoRR, (2024)A Functional (Monadic) Second-Order Theory of Infinite Trees., and . CoRR, (2019)Evolving Multilayer Neural Networks Using Permutation free Encoding Technique., and . IC-AI, page 32-38. CSREA Press, (2009)A Scalable and Privacy-Aware IoT Service for Live Video Analytics., , , , , and . MMSys, page 38-49. ACM, (2017)Securing Anonymous Communication Channels under the Selective DoS Attack., and . Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, page 362-370. Springer, (2013)Left-Handed Completeness for Kleene algebra, via Cyclic Proofs., , and . LPAR, volume 57 of EPiC Series in Computing, page 271-289. EasyChair, (2018)A Hybrid Deep Learning Technique for Sentiment Analysis in E-Learning Platform with Natural Language Processing., , and . SoftCOM, page 1-7. IEEE, (2022)On the Logical Strength of Confluence and Normalisation for Cyclic Proofs.. FSCD, volume 195 of LIPIcs, page 29:1-29:23. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting., , , , and . NDSS, The Internet Society, (2018)Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses., , and . NDSS, The Internet Society, (2016)