Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones., , , , , and . CoRR, (2018)Simulation and inversion of electrical conductivity distribution using the finite functions method., , , , and . FSKD, page 2746-2749. IEEE, (2012)Research on Embedded-Based Wireless Authentication System., , , and . ICICA (1), volume 307 of Communications in Computer and Information Science, page 469-475. Springer, (2012)Learning Belief Networks in Domains with Recursively Embedded Pseudo Independent Submodels, and . CoRR, (2013)Leveraging a Graph-Powered, Real-Time Recommendation Engine to Create Rapid Business Value., , , and . RecSys, page 385-386. ACM, (2016)A Bayesian Treatment for Singular Value Decomposition., , , and . HPCC/CSS/ICESS, page 1761-1767. IEEE, (2015)Fault tolerant scheduling with dynamic number of replicas in heterogeneous system., , , and . HPCC, page 434-441. IEEE, (2010)Modeling worms propagation on probability., , and . NSS, page 49-56. IEEE, (2011)Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice., , , and . INCoS, page 181-188. IEEE, (2013)Advance in Multiply Sectioned Bayesian Networks: Sensor Network Practitioners' Perspective., and . ETFA, page 590-593. IEEE, (2006)