Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Determining the relevance of input features for multilayer perceptrons., , and . SMC, page 874-879. IEEE, (2003)Shilling Attack Detection Using Rated Item Correlation for Collaborative Filtering., , and . SMC, page 3553-3558. IEEE, (2018)Using neural network classifier in post-processing system for handwritten Chinese character recognition., , and . SMC, page 1497-1502. IEEE, (2001)An extension of a fuzzy substroke extractor., and . SMC, page 4213-4216. IEEE, (1998)A proposed model for developing distributed programs by prototyping., and . SMC, page 4878-4883. IEEE, (1998)Refinement of fuzzy production rules by neuro-fuzzy networks., , and . SMC, page 200-205. IEEE, (2000)Multiple-Model Based Defense for Deep Reinforcement Learning Against Adversarial Attack., , , and . ICANN (1), volume 12891 of Lecture Notes in Computer Science, page 42-53. Springer, (2021)Intelligent book positioning for library using RFID and book spine matching., , , , , and . ICMLC, page 465-470. IEEE, (2011)Heuristic improvement for active learning using localized generalization error as selection criterion., , , and . SMC, page 3588-3593. IEEE, (2007)Shape-based image retrieval of Chinese paper-cutting using RBFNN with invariant moment., , , , , , and . ICMLC, page 808-814. IEEE, (2010)