Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Developing an Empirical Algorithm for Protecting Text-Based CAPTCHAs against Segmentation Attacks., and . TrustCom/ISPA/IUCC, page 636-643. IEEE Computer Society, (2013)Developing a Cloud Computing Based Approach for Forensic Analysis Using OCR., , and . IMF, page 59-68. IEEE Computer Society, (2013)Distributed Parallel Computing using Navigational Programming: Orchestrating Computations Around Data., , , , and . IASTED PDCS, page 453-458. IASTED/ACTA Press, (2002)Predicting the Impact of Android Malicious Samples via Machine Learning., , , , , and . IEEE Access, (2019)A Unified Variational Model for Single Image Dehazing., , , , and . IEEE Access, (2019)Discriminant Analysis of Hyperspectral Imagery Using Fast Kernel Sparse and Low-Rank Graph., , , , , and . IEEE Trans. Geoscience and Remote Sensing, 55 (11): 6085-6098 (2017)Joint Relay Selection and Power Allocation for the Physical Layer Security of Two-Way Cooperative Relaying Networks., , , and . Wireless Communications and Mobile Computing, (2019)Cross-Project Transfer Representation Learning for Vulnerable Function Discovery., , , , , , and . IEEE Trans. Industrial Informatics, 14 (7): 3289-3297 (2018)Security Analysis Methods on Ethereum Smart Contract Vulnerabilities: A Survey., , , , and . CoRR, (2019)Privacy Preserving in Location Data Release: A Differential Privacy Approach., , , , and . PRICAI, volume 8862 of Lecture Notes in Computer Science, page 183-195. Springer, (2014)