Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection., , , , and . IEEE Trans. Cybern., 44 (1): 66-82 (2014)Optimized energy management for plug-in hybrid vehicles with predicted driving cycles1., , , and . J. Intell. Fuzzy Syst., 46 (3): 6399-6409 (March 2024)Understanding the Evolution of Android App Vulnerabilities., , , , and . IEEE Trans. Reliab., 70 (1): 212-230 (2021)A Fast Forward Full-Duplex Cooperative Relay Scheme for Securing Wireless Communications., , , and . IEEE Signal Process. Lett., 26 (5): 775-779 (2019)ANCHOR: locating android framework-specific crashing faults., , , , , , and . Autom. Softw. Eng., 28 (2): 10 (2021)Co-Displayed Items Aware List Recommendation., , , , , , and . IEEE Access, (2020)Data gap decomposed by auxiliary modality for NIR-VIS heterogeneous face recognition., , , and . IET Image Process., 16 (1): 261-272 (2022)An Ultra-Thin and Compact Band-Pass Filter Based on Spoof Surface Plasmon Polaritons., , , , , and . IEEE Access, (2020)Robust Dry Bulk Fleet Route Optimization Under Navigation Risk Consideration., and . IEEE Access, (2021)WildFusion: Learning 3D-Aware Latent Diffusion Models in View Space., , , , , and . CoRR, (2023)