Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reach Out and Touch Space (Motion Learning)., , and . FG, page 234-241. IEEE Computer Society, (1998)Core technologies for service robotics., , , , , and . IROS, page 2979-2984. IEEE, (2004)A Visual Front-end for Simultaneous Localization and Mapping., , , , , , and . ICRA, page 44-49. IEEE, (2005)The vSLAM Algorithm for Robust Localization and Mapping., , , , , and . ICRA, page 24-29. IEEE, (2005)Detecting abnormal logins by discovering anomalous links via graph transformers., and . Comput. Secur., (2024)Economic and environmental comparative analysis on macro-femtocell deployments in LTE-A., , , and . VITAE, page 1-5. IEEE, (2013)NIST CyberSecurity Framework Compliance: A Generic Model for Dynamic Assessment and Predictive Requirements., , and . TrustCom/BigDataSE/ISPA (1), page 418-425. IEEE, (2015)3D lung nodule candidate detection in multiple scales., , , and . MVA, page 61-64. IEEE, (2015)Automatic Arteriovenous Nicking Identification by Color Fundus Images Analysis., , , and . ICIAR (2), volume 8815 of Lecture Notes in Computer Science, page 321-328. Springer, (2014)A Semi-Supervised Autoencoder Approach for Efficient Intrusion Detection in Network Traffic., , , and . LA-CCI, page 1-6. IEEE, (2023)