Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An interactive tool for teaching right management in 3D e-learning platform., , and . VRCAI, page 313-316. ACM, (2013)Exploring real-time super-resolution generative adversarial networks., , , , , and . Int. J. Sens. Networks, 36 (2): 85-96 (2021)A Super Point Detection Algorithm Under Sliding Time Windows Based on Rough and Linear Estimators., , , , and . IEEE Access, (2019)Some Jerk Systems with Hidden Chaotic Dynamics., , , , , and . Int. J. Bifurc. Chaos, 33 (6): 2350069:1-2350069:18 (May 2023)Wireless-Powered Mobile Edge Computing with Cooperated UAV., , and . SPAWC, page 1-5. IEEE, (2019)STAR-RIS Assisted Secret Key Generation: Joint Active and Passive Precoding Design., , , , , and . VTC Fall, page 1-6. IEEE, (2023)SRLA: A real time sliding time window super point cardinality estimation algorithm for high speed network based on GPU., , and . CoRR, (2018)A Novel Darknet Traffic Classification Method Based on Knowledge Graph with Dynamic Embedding Learning., , , , and . ICC, page 3799-3804. IEEE, (2023)Detecting Cryptomining Traffic Over an Encrypted Proxy Based on K-S Test., , , , and . ICC, page 3787-3792. IEEE, (2023)IM-Shield: A Novel Defense System against DDoS Attacks under IP Spoofing in High-speed Networks., , , , and . ICC, page 4168-4173. IEEE, (2022)