Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Reputation Management Framework Based on Global Trust Model for P2P Systems., , , and . International Conference on Computational Science (1), volume 3991 of Lecture Notes in Computer Science, page 896-899. Springer, (2006)Improved V-Net Based Image Segmentation for 3D Neuron Reconstruction., , , , and . BIBM, page 443-448. IEEE Computer Society, (2018)DeepBranch: Deep Neural Networks for Branch Point Detection in Biomedical Images., , , , , and . IEEE Trans. Medical Imaging, 39 (4): 1195-1205 (2020)Defending Against Meek DDoS Attacks By IP Traceback-based Rate Limiting., , , and . GLOBECOM, IEEE, (2006)A multi-direction image fusion based approach for classification of multi-focal nematode image stacks., , and . ICIP, page 3835-3839. IEEE, (2017)Stable Topology Support for Tracing DDoS Attackers in MANET., , , and . GLOBECOM, page 1-6. IEEE, (2011)Non-commutative hyper residuated lattices and hyper pseudo-BCK algebras., , and . ICNC-FSKD, page 2277-2282. IEEE, (2016)Knowledge Learning-Based Brain Storm Optimization Algorithm for Multimodal Optimization., , and . DMBD (2), volume 1745 of Communications in Computer and Information Science, page 133-143. Springer, (2022)Development of Enterprise Information System Using Business Component-Based Approach., , , and . CONFENIS, volume 205 of IFIP, page 361-369. Springer, (2006)Convolutional Neural Network Cascade Based Neuron Termination Detection in 3D Image Stacks., , , and . ICIP, page 4048-4052. IEEE, (2018)