Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficiently Passive Monitoring Flow Bandwidth., , , , and . NPC, volume 3779 of Lecture Notes in Computer Science, page 266-269. Springer, (2005)Fingerprint Enhancement Using Circular Gabor Filter., , and . ICIAR (2), volume 3212 of Lecture Notes in Computer Science, page 750-758. Springer, (2004)DDoS Attack Detection Method Based on Linear Prediction Model., , , , and . ICIC (1), volume 5754 of Lecture Notes in Computer Science, page 1004-1013. Springer, (2009)A simple approach for unsupervised domain adaptation., , and . ICPR, page 1566-1570. IEEE, (2016)Incremental Manifold Learning Algorithm Using PCA on Overlapping Local Neighborhoods for Dimensionality Reduction., , , and . ISICA, volume 5370 of Lecture Notes in Computer Science, page 406-415. Springer, (2008)A fast and accurate method for detecting fingerprint reference point., , and . Neural Comput. Appl., 29 (1): 21-31 (2018)Evaluating the effectiveness of situational case-based teaching: a view of concept mapping., , , , and . TURC, page 60-66. ACM, (2018)Variance Reduced K-Means Clustering., , , , and . AAAI, page 8187-8188. AAAI Press, (2018)A New RGB-D Gesture Video Dataset and Its Benchmark Evaluations on Light-Weighted Networks., , , , , and . NCTCS, volume 1494 of Communications in Computer and Information Science, page 47-58. Springer, (2021)DDoS Attack Detection Using Three-State Partition Based on Flow Interaction., , , , and . FGIT-SecTech, volume 58 of Communications in Computer and Information Science, page 176-184. Springer, (2009)