Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Control System for Six-Legged Walking Robot., , , , , and . J. Robotics Mechatronics, 5 (6): 570-574 (1993)New LDoS Attack in Zigbee Network and its Possible Countermeasures., , , and . SMARTCOMP, page 246-251. IEEE, (2021)Fault tolerance of a functionally adaptive and robust manipulator., , , , , , and . IROS, page 294-300. IEEE, (1993)Maximum Credibility Voting (MCV) An Integrative Approach for Accurate Diagnosis of Major Depressive Disorder from Clinically Readily Available Data., , , , , , , , , and 1 other author(s). APSIPA, page 1023-1032. IEEE, (2020)Automated Mapping Method for Sysmon Logs to ATT&CK Techniques by Leveraging Atomic Red Team., , , and . ICSPIS, page 104-109. IEEE, (2023)Memory-saving LDoS Attacker Detection Algorithms in Zigbee Network., , , , , and . J. Inf. Process., (2023)Object recognition using a feature search strategy generated from a 3D model., , and . ICCV, page 626-635. IEEE Computer Society, (1990)Improving Key Mismatch Attack on NewHope with Fewer Queries., , and . ACISP, volume 12248 of Lecture Notes in Computer Science, page 505-524. Springer, (2020)XAI-driven Adversarial Attacks on Network Intrusion Detectors., , , , , , , and . EICC, page 65-73. ACM, (2024)LDoS Attacker Detection Algorithms in Zigbee Network., , , , and . iThings/GreenCom/CPSCom/SmartData/Cybermatics, page 43-50. IEEE, (2021)