Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A transform domain-based anomaly detection approach to network-wide traffic., , , and . J. Network and Computer Applications, (2014)An Optimization Method for Parameters of SVM in Network Intrusion Detection System., , and . DCOSS, page 136-142. IEEE Computer Society, (2016)Region sampling and estimation of geosocial data with dynamic range calibration., , , , and . ICDE, page 1096-1107. IEEE Computer Society, (2014)Correlated flooding in low-duty-cycle wireless sensor networks., , , , and . ICNP, page 383-392. IEEE Computer Society, (2011)SHARE: SoH-aware reconfiguration to enhance deliverable capacity of large-scale battery packs., , , , and . ICCPS, page 169-178. ACM, (2015)Exploring power-voltage relationship for distributed peak demand flattening in microgrids., , , , , and . ICCPS, page 179-188. ACM, (2015)Integrating Energy Storage in Electricity Distribution Networks., , , , , , and . e-Energy, page 37-46. ACM, (2015)Recognition of architectural distortion in mammographic images with transfer learning., , and . CISP-BMEI, page 494-498. IEEE, (2016)Real-Time Data and Energy Management in Microgrids., and . RTSS, page 79-88. IEEE Computer Society, (2016)Mobile Hailing Technology and Taxi Driving Behaviors., , and . Marketing Science, 38 (5): 734-755 (2019)