Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrusion Detection Model Based on Rough Set and Random Forest., , , and . Int. J. Grid High Perform. Comput., 14 (1): 1-13 (2022)Understanding user activity patterns of the Swarm app: a data-driven study., , , , and . UbiComp/ISWC Adjunct, page 125-128. ACM, (2017)A Human Arm's Mechanical Impedance Tuning Method for Improving the Stability of Haptic Rendering., , , and . Robotica, 39 (4): 652-664 (2021)Integrated model of refining and petrochemical plant for enterprise-wide optimization., , , and . Comput. Chem. Eng., (2017)Production planning optimization of an ethylene plant considering process operation and energy utilization., , and . Comput. Chem. Eng., (2016)Exploiting the Collision-Free Region with Slotting Access for Data-Gathering in the Linear UANs., , , , and . ICCC, page 1-6. IEEE, (2023)DcsNet: a real-time deep network for crack segmentation., , , and . Signal Image Video Process., 16 (4): 911-919 (2022)A Cross-Platform Consumer Behavior Analysis of Large-Scale Mobile Shopping Data., , , , , , , , and . WWW, page 1785-1794. ACM, (2018)On Pitfalls of Test-Time Adaptation., , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 42058-42080. PMLR, (2023)Decoder Network over Lightweight Reconstructed Feature for Fast Semantic Style Transfer., , , , , and . ICCV, page 2488-2496. IEEE Computer Society, (2017)