Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stability analysis of haptic shared control and its application on a mobile assistive robot., and . HAVE, page 44-49. IEEE, (2012)Realization of a Catheter Driving Mechanism with Micro tactile sensor for Intravascular Neurosurgery., , , , , and . ROBIO, page 1628-1633. IEEE Computer Society, (2006)An Adaptability-Enhanced Few-Shot Website Fingerprinting Attack Based on Collusion., , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Harmfulness metrics in digital twins of social network rumors detection in cloud computing environment., , , and . J. Cloud Comput., 13 (1): 36 (December 2024)Exposing frame deletion by detecting abrupt changes in video streams., , , , , , and . Neurocomputing, (2016)Detection and Defense of Cache Pollution Attack Using State Transfer Matrix in Named Data Networks., , , , and . ICWS, page 545-556. IEEE, (2024)Context2Vector: Accelerating security event triage via context representation learning., , , , , , , , and . Inf. Softw. Technol., (2022)An Evolutionary Study of IoT Malware., , , , , , , , , and 2 other author(s). IEEE Internet Things J., 8 (20): 15422-15440 (2021)Identify the Copy & Paste Frames in Compressed Surveillance Video Based on Stream Parameters., , , and . RVSP, page 31-34. IEEE Computer Society, (2015)Design of a novel mobile assistive robot with haptic interaction., and . VECIMS, page 115-120. IEEE, (2012)