Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybridizing Euclidean and Hyperbolic Similarities for Attentively Refining Representations in Semantic Segmentation of Remote Sensing Images., , , , , , , and . IEEE Geosci. Remote. Sens. Lett., (2022)Hybridizing Cross-Level Contextual and Attentive Representations for Remote Sensing Imagery Semantic Segmentation., , , , , and . Remote. Sens., 13 (15): 2986 (2021)A Blockchain-Based Copyright Protection Scheme With Proactive Defense., , , , , and . IEEE Trans. Serv. Comput., 16 (4): 2316-2329 (July 2023)Tensor-Train-Based Higher Order Dominant Z-Eigen Decomposition for Multi-Modal Prediction and Its Cloud/Edge Implementation., , , , and . IEEE Trans. Netw. Sci. Eng., 8 (2): 1353-1366 (2021)On the Distributed DoS Attacks Targeting at the Bottlenecked Links: More Threatening DoS Attacks than Server Targeting DoS Attacks., and . CNIOT, page 40:1-40:7. ACM, (2021)Equivariant divergence formula for chaotic flows., and . CoRR, (2023)Fusion: Efficient and Secure Inference Resilient to Malicious Servers., , , , , , , and . NDSS, The Internet Society, (2023)Fusion: Efficient and Secure Inference Resilient to Malicious Server and Curious Clients., , , , , , and . CoRR, (2022)A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network., , , , and . CoRR, (2022)Crowdsourced test report prioritization considering bug severity., and . Inf. Softw. Technol., (2021)