Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Remodeling and Simulation of Intrusion Detection Evaluation Dataset., , and . Security and Management, page 245-251. CSREA Press, (2006)Evaluation Model for Breast Cancer Susceptibly Gene and its Implementation Using Cytoscape., and . BMEI, page 1-5. IEEE, (2009)User Profiling for Query Refinement., , , and . AMCIS, Association for Information Systems, (2014)Fast and Efficient Basis Selection Methods for Embedded Wavelet Packet Image Coding., and . ICIAR (1), volume 4141 of Lecture Notes in Computer Science, page 480-492. Springer, (2006)Linear Cryptanalysis of FASER128/256 and TriviA-ck., , and . INDOCRYPT, volume 8885 of Lecture Notes in Computer Science, page 237-254. Springer, (2014)Privacy Protection Workflow Publishing Under Differential Privacy., , , , and . WISA, volume 11817 of Lecture Notes in Computer Science, page 382-394. Springer, (2019)Compressive Channel Estimation in Space Domain for Massive MIMO Systems., and . VTC Fall, page 1-5. IEEE, (2015)A Nonconforming Characteristic Finite Element Method for Nonlinear Advection-Dominated Diffusion Equation with Memory Term., , and . BIC-TA, volume 212 of Advances in Intelligent Systems and Computing, page 179-187. Springer, (2013)Computing minimum cuts in hypergraphs., and . CoRR, (2016)Stability analysis of neutral stochastic delay differential equations by a generalisation of Banach's contraction principle., , and . Int. J. Control, 90 (8): 1555-1560 (2017)