Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Direct observation of intrinsic twin domains in tetragonal CH3NH3PbI3, , , , , , and . Nature Communications, (February 2017)Tracking Human Hand Motion Using Genetic Particle Filter., and . SMC, page 4942-4947. IEEE, (2006)Cloud-assisted privacy-conscious large-scale Markowitz portfolio., , , , , and . Inf. Sci., (2020)A novel feature-based framework enabling multi-type DDoS attacks detection., , , and . World Wide Web (WWW), 26 (1): 163-185 (January 2023)A Research of Gas Open-Set Identification Based on Data Augmentation Algorithm., and . IEEE Access, (2023)Mitigating the Impact of a False Message Through Sequential Release of Clarifying Messages., , , , and . IEEE Trans. Netw. Sci. Eng., 11 (2): 1785-1798 (March 2024)Boundary Guided Mixing Trajectory for Semantic Control with Diffusion Models., , , , and . CoRR, (2023)Saying the Unseen: Video Descriptions via Dialog Agents., , , and . CoRR, (2021)CFNet: Facial expression recognition via constraint fusion under multi-task joint learning network., , , , and . Appl. Soft Comput., (July 2023)RanDroid: Structural Similarity Approach for Detecting Ransomware Applications in Android Platform., , , , , , and . EIT, page 892-897. IEEE, (2018)