Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A 65nm dual-band 3-stream 802.11n MIMO WLAN SoC., , , , , , , , , and 21 other author(s). ISSCC, page 170-172. IEEE, (2011)Crown Jewels Analysis using Reinforcement Learning with Attack Graphs., , , , , and . SSCI, page 1-6. IEEE, (2021)Using Cyber Terrain in Reinforcement Learning for Penetration Testing., , , , , , , and . COINS, page 1-8. IEEE, (2022)Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs., , , , , , , , , and . DSC, page 1-8. IEEE, (2022)Development and Implementation of HIT to Support NCDs in Low and Middle Income Countries., , and . AMIA, AMIA, (2018)Iterative Hadoop MapReduce-Based Subgraph Enumeration in Network Motif Analysis., , and . CLOUD, page 893-900. IEEE Computer Society, (2015)Robust Dense Depth Maps Generations from Sparse DVS Stereos., , , , , , and . BMVC, BMVA Press, (2017)Real-time motion estimation based on event-based vision sensor., , , , , , and . ICIP, page 204-208. IEEE, (2014)Adaptive Temporal Pooling for Object Detection using Dynamic Vision Sensor., , , , , , and . BMVC, BMVA Press, (2017)Gesture recognition system based on Adaptive Resonance Theory., , , , , , and . ICPR, page 3818-3822. IEEE Computer Society, (2012)