Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AASA: a Method of Automatically Acquiring Semantic Annotations, , and . Journal of Information Science, 33 (4): 435-450 (2007)toread.JITDefender: A Defense against JIT Spraying Attacks., , , and . SEC, volume 354 of IFIP Advances in Information and Communication Technology, page 142-153. Springer, (2011)Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation., , , , and . ISC, volume 6531 of Lecture Notes in Computer Science, page 181-195. Springer, (2010)Study on the Differential Braking of an Eddy Current Retarder Axle Used for Articulated Vehicles., , and . ICITE, page 596-600. IEEE, (2020)A Scalable Load Balancing System for NOWs., and . ACM SIGOPS Oper. Syst. Rev., 32 (3): 55-63 (1998)Novel input-output representation of general non-uniformly sampled-data systems., , , and . ACC, page 60-65. IEEE, (2016)Distributed Energy Efficient Data Gathering with Intra-cluster Coverage in Wireless Sensor Networks., , , , and . APWeb, volume 3841 of Lecture Notes in Computer Science, page 109-120. Springer, (2006)Gradient based and least squares based iterative algorithms for matrix equations AXB + CXTD = F., , and . Appl. Math. Comput., 217 (5): 2191-2199 (2010)Pollution attack: a new attack against localization in wireless sensor networks., , , , and . WCNC, page 2038-2043. IEEE, (2009)Learning Long-Term Temporal Features With Deep Neural Networks for Human Action Recognition., , , and . IEEE Access, (2020)