Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-time chaotic video encryption based on multithreaded parallel confusion and diffusion., , , and . CoRR, (2023)Surrogate-assisted Phasmatodea population evolution algorithm applied to wireless sensor networks., , , and . Wirel. Networks, 29 (2): 637-655 (February 2023)A Practical Non-Intrusive Cyber Security Vulnerability Assessment Method for Cyber-Insurance., , and . DSC, page 261-269. IEEE, (2023)NiNSRAPM: An Ensemble Learning Based Non-intrusive Network Security Risk Assessment Prediction Model., , , , and . DSC, page 17-23. IEEE, (2022)Updating control modes based on terrain classification., , and . ICRA, page 4417-4423. IEEE, (2010)Gating threshold value determination for the motion gating of positron emission tomography/computed tomography., , , , , , and . BMEI, page 189-193. IEEE, (2014)Multiplicative LSTM for sequence modelling, , , and . (2016)cite arxiv:1609.07959.Terrain surface classification for autonomous ground vehicles using a 2D laser stripe-based structured light sensor., , , and . IROS, page 2174-2181. IEEE, (2009)Joint Uncertainty Decoding for Noise Robust Subspace Gaussian Mixture Models., , , and . IEEE Trans. Speech Audio Process., 21 (9): 1791-1804 (2013)Internal Language Model Training for Domain-Adaptive End-To-End Speech Recognition., , , , , , , , and . ICASSP, page 7338-7342. IEEE, (2021)