Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intelligent GSM Cell Coverage Analysis System Based on GIS., , , and . JCP, 6 (5): 897-904 (2011)An improved inter-relay cooperation scheme for distributed relaying networks., , , , and . WSA, page 62-69. IEEE, (2012)Learning a Mahalanobis distance metric via regularized LDA for scene recognition., , and . ICIP, page 3125-3128. IEEE, (2012)Extraction and Simplification of Building Façade Pieces from Mobile Laser Scanner Point Clouds for 3D Street View Services., , , , and . ISPRS Int. J. Geo-Information, 5 (12): 231 (2016)Robust Reconstruction of Fluorescence Molecular Tomography Based on Sparsity Adaptive Correntropy Matching Pursuit Method for Stem Cell Distribution., , , , , , , , and . IEEE Trans. Med. Imaging, 37 (10): 2176-2184 (2018)Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge., , and . Sensors, 17 (1): 160 (2017)Knowledge Guided Multi-instance Multi-label Learning via Neural Networks in Medicines Prediction., , , , and . ACML, volume 95 of Proceedings of Machine Learning Research, page 831-846. PMLR, (2018)Abstract interpretation under speculative execution., and . PLDI, page 802-815. ACM, (2019)Online Detection of False Data Injection Attacks to Synchrophasor Measurements: A Data-Driven Approach., and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)Synthesizing Runtime Enforcer of Safety Properties Under Burst Error., , and . NFM, volume 9690 of Lecture Notes in Computer Science, page 65-81. Springer, (2016)