Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Single- and two-person action recognition based on silhouette shape and optical point descriptors., , , , , and . Signal Image Video Process., 12 (5): 853-860 (2018)A survey on common criteria (CC) evaluating schemes for security assessment of IT products., , , , , , , , and . PeerJ Comput. Sci., (2021)Blind Multiuser Detection for Synchronous High Rate Space-Time Block Coded Transmission., and . IEEE Trans. Wirel. Commun., 10 (7): 2171-2185 (2011)An effective empirical approach to VoIP traffic classification., , , , and . Turkish J. Electr. Eng. Comput. Sci., (2017)Open source computer game application: An empirical analysis of quality concerns., , , and . Entertain. Comput., (2017)Joint ARQ Receiver Design for Bandwidth Efficient MIMO Systems., and . GLOBECOM, page 3566-3570. IEEE, (2008)Video anomaly detection and localization based on appearance and motion models., , , and . Multim. Tools Appl., 80 (17): 25875-25895 (2021)A Malware Evasion Technique for Auditing Android Anti-Malware Solutions., , , , , , and . WETICE, page 125-130. IEEE, (2021)Revolutionizing Data Center Networks: Dynamic Load Balancing via Floodlight in SDN Environment., , , , , , , and . ICACS, page 1-8. IEEE, (2024)A Sharded Blockchain Architecture for Healthcare Data., , and . COMPSAC, page 1794-1799. IEEE, (2024)