Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis., , , and . IEEE Trans. Inf. Forensics Secur., 8 (6): 936-948 (2013)Geometric Auto-Calibration of SAR Images Utilizing Constraints of Symmetric Geometry., , , , , and . IEEE Geosci. Remote. Sens. Lett., (2022)Rationality Analytics from Trajectories., , and . ACM Trans. Knowl. Discov. Data, 10 (1): 10:1-10:22 (2015)Efficient Online Summarization of Large-Scale Dynamic Networks., , , and . IEEE Trans. Knowl. Data Eng., 28 (12): 3231-3245 (2016)Anomaly Detection from Incomplete Data., , and . ACM Trans. Knowl. Discov. Data, 9 (2): 11:1-11:22 (2014)A Dempster-Shafer theory based witness trustworthiness model., , , and . AAMAS, page 1361-1362. IFAAMAS, (2012)A Method for Measuring Shaft Diameter Based on Light Stripe Image Enhancement., , , and . Sensors, 24 (1): 303 (2024)Compositional Verification of Initial-State Opacity for Switched Systems., , and . CDC, page 2146-2151. IEEE, (2020)HUNTS: A Trajectory Recommendation System for Effective and Efficient Hunting of Taxi Passengers., , , and . MDM (1), page 107-116. IEEE Computer Society, (2013)On Understanding the Influence of Controllable Factors with a Feature Attribution Algorithm: a Medical Case Study., , , , , and . INISTA, page 1-8. IEEE, (2022)