Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IKE vulnerability discovery based on fuzzing., , , and . Security and Communication Networks, 6 (7): 889-901 (2013)Nighttime Single Image Dehazing via Pixel-Wise Alpha Blending., , , , , and . IEEE Access, (2019)Unsupervised Extraction of Video Highlights Via Robust Recurrent Auto-encoders., , , , , and . CoRR, (2015)Modeling and identification of the nociceptive system using psychophysical measurements.. University of Twente, Enschede, Netherlands, (2015)base-search.net (ftunivtweneemcs:oai:ewi.utwente.nl:26515).Improving Rocchio Algorithm for Updating User Profile in Recommender Systems., , , and . WISE (1), volume 8180 of Lecture Notes in Computer Science, page 162-174. Springer, (2013)Joint Optimization of Routing and Storage Node Deployment in Heterogeneous Wireless Sensor Networks Towards Reliable Data Storage., , , , and . WASA, volume 11604 of Lecture Notes in Computer Science, page 162-174. Springer, (2019)Learning based screen image compression., , and . MMSP, page 77-82. IEEE, (2012)An efficient nonlocal variational method with application to underwater image restoration., , , , and . Neurocomputing, (2019)Study on the over-voltage and over-current of grid-connected inverters in non-fault conditions., , , and . ISIE, page 1080-1085. IEEE, (2012)Collaborative Learning in General Graphs with Limited Memorization: Learnability, Complexity and Reliability., , , , , , and . CoRR, (2022)