Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Detection of Malicious Web Pages Using High-Interaction Client Honeypots., , , , and . J. Inf. Sci. Eng., 28 (5): 911-924 (2012)A birthmark-based method for intellectual software asset management., , , , , , and . ICUIMC, page 39:1-39:6. ACM, (2014)The Gap between What a Service Provider Shows Off and What Users Really Watch., and . HCI (3), volume 8512 of Lecture Notes in Computer Science, page 710-720. Springer, (2014)Rate Adaptation with Collision Differentiation for IEEE 802.11 wireless network., , and . CCNC, page 916-920. IEEE, (2012)A Numerical Analysis of the Changes in O3 Concentration in a Wildfire Plume., , , , , , , and . Remote. Sens., 14 (18): 4549 (2022)Grading algorithm for cascading failures and propagation of precision error for the engineering course exams.. ACM Southeast Regional Conference, page 38:1. ACM, (2018)Learning to Visually Localize Sound Sources from Mixtures without Prior Source Knowledge., , , and . CoRR, (2024)sRGB Real Noise Modeling via Noise-Aware Sampling with Normalizing Flows., , , and . ICLR, OpenReview.net, (2024)Identifying Windows Installer Package Files for Detection of Pirated Software., , , , , and . IMIS, page 287-290. IEEE Computer Society, (2014)High-performance electrified hydrogel actuators based on wrinkled nanomembrane electrodes for untethered insect-scale soft aquabots., , , , , , , , , and 1 other author(s). Sci. Robotics, (2022)