Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formation-Based Tracking Method for Human Following Robot., , , , and . UR, page 24-28. IEEE, (2018)Saliency-Aware Time Series Anomaly Detection for Space Applications., and . PAKDD (1), volume 14645 of Lecture Notes in Computer Science, page 327-339. Springer, (2024)ITAD: Integrative Tensor-based Anomaly Detection System for Reducing False Positives of Satellite Systems., , , , , , and . CIKM, page 2733-2740. ACM, (2020)BZNet: Unsupervised Multi-scale Branch Zooming Network for Detecting Low-quality Deepfake Videos., , and . WWW, page 3500-3510. ACM, (2022)Detecting In-vehicle CAN Message Attacks Using Heuristics and RNNs., , , and . IOSec@RAID, volume 11398 of Lecture Notes in Computer Science, page 39-45. Springer, (2018)CANTransfer: transfer learning based intrusion detection on a controller area network using convolutional LSTM network., , and . SAC, page 1048-1055. ACM, (2020)Examining the Relationship Between Songs and Psychological Characteristics., , , , , and . HCI (43), volume 12425 of Lecture Notes in Computer Science, page 105-115. Springer, (2020)TAR: Generalized Forensic Framework to Detect Deepfakes Using Weakly Supervised Learning., , , and . SEC, volume 625 of IFIP Advances in Information and Communication Technology, page 351-366. Springer, (2021)Detecting Both Machine and Human Created Fake Face Images In the Wild., , , , and . MPS@CCS, page 81-87. ACM, (2018)Applications of genome-scale metabolic network model in metabolic engineering, , , and . 42 (3): 339--348 (2015)