Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Packet-Based Intrusion Detection Using Bayesian Topic Models in Mobile Edge Computing., , and . Secur. Commun. Networks, (2020)An Improved Cross-Validated Adversarial Validation Method., , , , , and . KSEM (1), volume 14117 of Lecture Notes in Computer Science, page 343-353. Springer, (2023)Object-Centric Unsupervised Image Captioning., , , , and . ECCV (36), volume 13696 of Lecture Notes in Computer Science, page 219-235. Springer, (2022)We Need to Talk About Reproducibility in NLP Model Comparison., , , , , and . EMNLP, page 9424-9434. Association for Computational Linguistics, (2023)Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (12): 3833-3836 (2008)An Efficient Anonymous Registration Scheme for Mobile IPv4., , , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 758-766. Springer, (2006)An Attack to an Anonymous Certificateless Group Key Agreement Scheme and Its Improvement., , , and . SpaCCS, volume 10656 of Lecture Notes in Computer Science, page 56-69. Springer, (2017)MA-LMM: Memory-Augmented Large Multimodal Model for Long-Term Video Understanding., , , , , , , and . CoRR, (2024)Enhanced wavelet convolutional neural networks for visual tracking., , and . J. Electronic Imaging, 27 (05): 053046 (2018)Design of Secure Watermarking Scheme for Watermarking Protocol., , , , and . PCM, volume 4810 of Lecture Notes in Computer Science, page 357-366. Springer, (2007)