Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Behavior Observation-Based Rival's Private Information Inferring., , , and . NCM (1), page 224-228. IEEE Computer Society, (2008)BotanicGarden: A High-Quality Dataset for Robot Navigation in Unstructured Natural Environments., , , , , , , , , and 3 other author(s). IEEE Robotics Autom. Lett., 9 (3): 2798-2805 (2024)An AUTOSAR Crypto Stack System for Supporting Automotive Electronic Information Security., , , , , and . CCEAI, page 253-260. ACM, (2024)Towards Knowledge Sharing Oriented Adaptive Control., , , and . Cybern. Syst., 53 (5): 520-528 (2022)An Effective Finite Element Method with Shifted Fractional Powers Bases for Fractional Boundary Value Problems., , and . J. Sci. Comput., 92 (1): 4 (2022)STFN: Spatio-Temporal Fusion Network to Detect Ethereum Phishing Scams., , , , , , , , and . EITCE, page 599-605. ACM, (2023)Fuzzy system for monitoring energy consumption of wireless sensor network nodes., , , , and . J. Intell. Fuzzy Syst., 35 (4): 4319-4328 (2018)Approximate Multiplier Using Reordered 4-2 Compressor with OR-based Error Compensation., , and . ASICON, page 1-4. IEEE, (2019)A hybrid numerical method for the KdV equation by finite difference and sinc collocation method., , and . Appl. Math. Comput., (2019)Inferring Rival's Private Information in Game Circumstance., , and . ICNC (1), page 179-183. IEEE Computer Society, (2009)