Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Demo: Wanda, Securely Introducing Mobile Devices., , , and . MobiSys (Companion Volume), page 113. ACM, (2016)Exploiting Fully Convolutional Network and Visualization Techniques on Spontaneous Speech for Dementia Detection., and . CoRR, (2020)A hybrid neural network model for predicting kidney disease in hypertension patients based on electronic health records., , , , and . BMC Medical Informatics Decis. Mak., 19-S (2): 131-138 (2019)Exploiting Relevance of Speech to Sleepiness Detection via Attention Mechanism., , , and . ICC, page 5527-5532. IEEE, (2023)Exploiting Physical Presence Sensing to Secure Voice Assistant Systems., , , and . ICC, page 1-6. IEEE, (2021)Provably secure and efficient bounded ciphertext policy attribute based encryption., , , and . AsiaCCS, page 343-352. ACM, (2009)Observer-based Sliding Mode Fault-Tolerant Control for Spacecraft Attitude System with Actuator Faults., , , and . CAA SAFEPROCESS, page 154-159. IEEE, (2019)LIDAUS: Localization of IoT Device via Anchor UAV SLAM., , , , and . IPCCC, page 1-11. IEEE, (2020)Automatic sub-category partitioning and parts localization for learning a robust object model., , and . Image Vis. Comput., 32 (9): 579-589 (2014)A Simple User Authentication Scheme for Grid Computing., , , and . Int. J. Netw. Secur., 7 (2): 202-206 (2008)