Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information security decisions of firms considering security risk interdependency., , , and . Expert Syst. Appl., (2021)CFGN: A Lightweight Context Feature Guided Network for Image Super-Resolution., , , , , and . IEEE Trans. Emerg. Top. Comput. Intell., 8 (1): 855-865 (February 2024)How to react to hacker types and asset types in security decision-making., , , and . Expert Syst. Appl., (November 2023)Smart object recommendation based on topic learning and joint features in the social internet of things., , , , , , and . Digit. Commun. Networks, 9 (1): 22-32 (February 2023)VLMAE: Vision-Language Masked Autoencoder., , , , , , and . CoRR, (2022)SVD-CNN: A Convolutional Neural Network Model with Orthogonal Constraints Based on SVD for Context-Aware Citation Recommendation., , , and . Comput. Intell. Neurosci., (2020)Aspect-based sentiment classification with multi-attention network., , , and . Neurocomputing, (2020)Transferable Adversarial Attacks for Deep Scene Text Detection., , , , , and . ICPR, page 8945-8951. IEEE, (2020)HOCA: Higher-Order Channel Attention for Single Image Super-Resolution., , , , , and . ICASSP, page 1605-1609. IEEE, (2021)Bishift-Net for Image Inpainting., , , and . ICASSP, page 2470-2474. IEEE, (2021)