Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Effective Paraphrasing for Information Disguise., , , , , and . ECIR (2), volume 13981 of Lecture Notes in Computer Science, page 331-340. Springer, (2023)Giant cell lesions: A diagnostic mystery, case report and review of literature, , , , and . GSC Advanced Research and Reviews, 7 (2): 061-067 (May 2021)Adapting Deep Neural Networks for Pedestrian-Detection to Low-Light Conditions without Re-training., , , and . ICCVW, page 2535-2541. IEEE, (2021)Juvenile ossifying fibroma (JOF) – A rare case report, , , and . GSC Advanced Research and Reviews, 8 (1): 098-102 (July 2021)Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning., , , , , , , and . CNS, page 1-9. IEEE, (2020)Instance-Level Semantic Maps for Vision Language Navigation., , , , , , , , , and . RO-MAN, page 507-512. IEEE, (2023)End-to-End System Level Solution for DDoS Attack Detection and Prediction for 5G and Future Wireless Networks., , and . SmartNets, page 1-7. IEEE, (2024)Digital Image Forensics Using Hexadecimal Image Analysis., , and . AHFE (10), volume 268 of Lecture Notes in Networks and Systems, page 176-183. Springer, (2021)