Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Error Bounds for Linear Complementarity Problem of S-Nekrasov Matrix., and . AIAM (ACM), page 1044-1046. ACM, (2021)Performance Analysis on 3D Beamforming for Downlink In-Band Wireless Backhaul for Small Cells., , , , , and . VTC Fall, page 1-6. IEEE, (2017)Time-aware Neural Trip Planning Reinforced by Human Mobility., , , , , and . IJCNN, page 1-8. IEEE, (2022)A Peak-To-Average Power Ratio Suppression Method for Broadband LEO Satellite Communication., , , and . ICETC, page 141-146. ACM, (2020)An Empirical Study of Alexa Skill System from Malicious Skill Developers., and . AIIoT, page 481-486. IEEE, (2023)UCLP: A Novel UAV Cybersecurity Laboratory Platform., , , and . SIGITE, page 23-28. ACM, (2021)Incremental learning model based on an improved CKS-PFNN for aluminium electrolysis manufacturing., , , , and . Neural Comput. Appl., 34 (3): 2083-2102 (2022)The Construction of a Virtual Backbone with a Bounded Diameter in a Wireless Network., , , and . Wirel. Commun. Mob. Comput., (2020)Joint 3D Beamforming and Power Allocation in Distributed Antenna Systems., , , , and . ICCS, page 89-93. IEEE, (2018)Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis, , and . International Journal of Computer Science and Security (IJCSS), 15 (3): 59-72 (June 2021)