Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing key issuing in peer-to-peer networks., , , , , , and . SAC, page 84-85. ACM, (2009)Seismic Noise Attenuation Using Variational Mode Decomposition and the Schroedinger Equation., , , , , and . IEEE Trans. Geosci. Remote. Sens., (2024)A Hybrid Movie Recommender Based on Ontology and Neural Networks., , , , , and . GreenCom/CPSCom, page 846-851. IEEE Computer Society, (2010)A 23.8-bit ENOB, ±5V Input Range Readout Circuit for High Precision Sensor Applications with 173.7dB-FoM., , , , , and . ISCAS, page 1-5. IEEE, (2024)Diverse Feature Blend Based on Filter-Bank Common Spatial Pattern and Brain Functional Connectivity for Multiple Motor Imagery Detection., , , , , , , , , and . IEEE Access, (2020)Parametric studies and data development of two-dimensional cellular structures and crystals at different length scales.. Liverpool John Moores University, UK, (2021)British Library, EThOS.PGC: Decentralized Confidential Payment System with Auditability., , , and . ESORICS (1), volume 12308 of Lecture Notes in Computer Science, page 591-610. Springer, (2020)On Scaling and Accelerating Decentralized Private Blockchains., , , , , and . BigDataSecurity/HPSC/IDS, page 267-271. IEEE, (2017)Settlement-based framework for long-term serviceability assessment of immersed tunnels., , and . Reliab. Eng. Syst. Saf., (2022)Protecting Compressive Ghost Imaging with Hyperchaotic System and DNA Encoding., , , and . Complex., (2020)