Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ordering and returns handling decisions and coordination in a supply chain with demand uncertainty., , , and . ITOR, 27 (2): 1033-1057 (2020)Secure Outage Probability Analysis of Relay Networks Based on Cooperative Jamming., , , and . CyberC, IEEE, (2018)Scheduling dependent coflows to minimize the total weighted job completion time in datacenters., , , , , , , , and . Comput. Networks, (2019)Complete Coverage Autonomous Underwater Vehicles Path Planning Based on Glasius Bio-Inspired Neural Network Algorithm for Discrete and Centralized Programming., , , and . IEEE Trans. Cogn. Dev. Syst., 11 (1): 73-84 (2019)Emotion recognition based on fusion of long short-term memory networks and SVMs., , , , , and . Digit. Signal Process., (2021)Event-Triggered Dynamic Coverage Control for Multiple Stratospheric Airships., , and . Sensors, 22 (7): 2734 (2022)Bypassing software-based remote attestation using debug registers., , , , , , and . Connect. Sci., (2024)Unified High-binding Watermark for Unconditional Image Generation Models., , , , , and . CoRR, (2023)Hybrid Isolation Model for Device Application Sandboxing Deployment in Zero Trust Architecture., , , , , , and . ACNS Workshops, volume 13285 of Lecture Notes in Computer Science, page 104-123. Springer, (2022)DRSA: Debug Register-Based Self-relocating Attack Against Software-Based Remote Authentication., , , , , , and . BlockTEA, volume 577 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 23-40. Springer, (2023)