Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Image Filtering., , and . ICIP, page 1553-1556. IEEE, (2006)A New Security Model for Secure Thresholding., and . ICASSP (2), page 273-276. IEEE, (2007)Does director interlock impact corporate R&D investment?, , , , and . Decis. Support Syst., (2015)Validation of a brain-computer interface version of the digit symbol substitution test in healthy subjects., , , and . Comput. Biol. Medicine, (2020)Spatio-temporal patterns and pedestrian simulation. Nanyang Technological University, Singapore, (2014)Vote selection mechanisms and probabilistic data association-based mobile node localization algorithm in mixed LOS/NLOS environments., , , , , and . Telecommun. Syst., 62 (4): 641-655 (2016)J oint Optimization of Digital Beamforming and RF Interference Cancellation for SBFD., , , , , and . GLOBECOM (Workshops), page 527-532. IEEE, (2023)Channel Estimation and Reflecting Design of RIS-Aided Coded Systems Over Time-Varying Channels., , , , , and . ICCT, page 1578-1584. IEEE, (2023)A New Framework for Anomaly Detection Based on KNN-Distort in the Metro Traffic Flow., , , and . ICSI (2), volume 9141 of Lecture Notes in Computer Science, page 107-116. Springer, (2015)Fast Detection of Frequent Change in Focus of Human Attention., , and . WAPCV, volume 3368 of Lecture Notes in Computer Science, page 216-230. Springer, (2004)