Author of the publication

Multi-source signal alignment and efficient multi-dimensional feature classification in the application of EEG-based subject-independent drowsiness detection.

, , , , , and . Biomed. Signal Process. Control., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TUDAMatch: Time-Series Unsupervised Domain Adaptation for Automatic Sleep Staging., , , , and . NER, page 1-4. IEEE, (2023)EEG-based Driving Fatigue Detection during Operating the Steering Wheel Data Section., , , , and . EMBC, page 248-251. IEEE, (2020)Bestie: Very Practical Searchable Encryption with Forward and Backward Security., , , , , and . ESORICS (2), volume 12973 of Lecture Notes in Computer Science, page 3-23. Springer, (2021)SDD: A trusted display of FIDO2 transaction confirmation without trusted execution environment., , , , , and . Future Gener. Comput. Syst., (2021)Tensor-Based EEG Network Formation and Feature Extraction for Cross-Session Driving Drowsiness Detection., , , , and . EMBC, page 252-255. IEEE, (2020)Multi-source signal alignment and efficient multi-dimensional feature classification in the application of EEG-based subject-independent drowsiness detection., , , , , and . Biomed. Signal Process. Control., (2021)You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults., , , , , and . ESORICS (3), volume 14346 of Lecture Notes in Computer Science, page 141-161. Springer, (2023)DP-YOLOv5: Computer Vision-Based Risk Behavior Detection in Power Grids., , , , , , and . PRCV (1), volume 13019 of Lecture Notes in Computer Science, page 318-328. Springer, (2021)Themis: Robust and Light-Client Dynamic Searchable Symmetric Encryption., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay., , , , , , and . ESORICS (2), volume 13555 of Lecture Notes in Computer Science, page 86-104. Springer, (2022)