Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Novel boundary determination algorithm for lane detection., , , , , , and . ICCVE, page 598-603. IEEE, (2013)Web-based Assessment and Test Analyses (WATA) system: development and evaluation., , , , and . J. Comput. Assist. Learn., 20 (1): 59-71 (2004)Friendship-based Cooperative Jamming for Secure Communication in Poisson Networks., , , and . CoRR, (2016)A novel statistical technique for intrusion detection systems., , , and . Future Gener. Comput. Syst., (2018)Deep learning for Antisocial Behaviour Analysis on Social Media., , , , and . IV, page 428-434. IEEE, (2020)Research on The Crawler Technology with Low-Code for Image Data in Electric Utility., , , , , , and . ICITEE, page 80-84. ACM, (2022)Graph Intelligence Enhanced Bi-Channel Insider Threat Detection., , , , , , and . NSS, volume 13787 of Lecture Notes in Computer Science, page 86-102. Springer, (2022)Towards Identify Anonymization in Large Survey Rating Data., and . NSS, page 99-104. IEEE Computer Society, (2010)The optimization of pipeline network based on parent genetic algorithms., , and . ISKE, page 519-523. IEEE, (2008)A Novel Channel Estimation Scheme for OTFS., , and . ICCT, page 12-16. IEEE, (2020)