Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal sanitization synthesis for web application vulnerability repair., , , , , and . ISSTA, page 189-200. ACM, (2016)Quantitative Analysis of Cloud-Based Streaming Services., , and . IEEE SCC, page 216-223. IEEE Computer Society, (2013)Network-traffic anomaly detection with incremental majority learning., , , and . IJCNN, page 1-8. IEEE, (2015)Clustering iOS executable using self-organizing maps., , , and . IJCNN, page 1-8. IEEE, (2013)Improving the genetic-algorithm-optimized wavelet neural network for stock market prediction., , , , and . IJCNN, page 3038-3042. IEEE, (2014)Efficient testability enhancement for combinational circuit., and . ICCD, page 168-179. IEEE Computer Society, (1995)Impact of Inverter-Interfaced Renewable Energy Generators on Distance Protection and an Improved Scheme., , , , and . IEEE Trans. Industrial Electronics, 66 (9): 7078-7088 (2019)Coupling effects of mechanical vibrations and thermal cycling on reliability of CCGA solder joints., , , , , , , and . Microelectronics Reliability, 55 (11): 2396-2402 (2015)String Analysis via Automata Manipulation with Logic Circuit Representation., , , , and . CAV (1), volume 9779 of Lecture Notes in Computer Science, page 241-260. Springer, (2016)Cause-chain analysis of coal-mine gas explosion accident based on Bayesian network model., , and . Cluster Computing, 22 (Suppl 1): 1549-1557 (2019)