Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Perfusion study on Modic changes of spine based on DCE-MRI., , , , , , and . BHI, page 365-367. IEEE, (2012)Design of a new wind speed measuring installation., , and . ICARCV, page 1920-1923. IEEE, (2008)Adaptive shock filter for image super-resolution and enhancement., , , , , and . J. Visual Communication and Image Representation, (2016)Systematic Construction and Verification Methodology for LDPC Codes., , and . WASA, volume 6843 of Lecture Notes in Computer Science, page 366-379. Springer, (2011)Mal-LSGAN: An Effective Adversarial Malware Example Generation Model., , , , , and . GLOBECOM, page 1-6. IEEE, (2021)Systematic construction, verification and implementation methodology for LDPC codes., , , and . EURASIP J. Wireless Comm. and Networking, (2012)Planation surface extraction and quantitative analysis based on high-resolution digital elevation models., , , and . IGARSS, page 5369-5371. IEEE, (2005)Multi-Agent Deep Reinforcement Learning with Adaptive Policies., and . CoRR, (2019)Incremental H∞ performance for a class of stochastic switched nonlinear systems., , , and . J. Franklin Institute, 355 (15): 7134-7157 (2018)Assessing transferability of adversarial examples against malware detection classifiers., , and . CF, page 211-214. ACM, (2019)