Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lossy links diagnosis for wireless sensor networks by utilising the existing traffic information., , , and . IJES, 6 (2/3): 140-147 (2014)Energy-Efficient Multicast Protocol for Real-Time Wireless Sensor Networks., , and . HPCC/EUC, page 979-984. IEEE, (2013)A New Post-Silicon Debug Approach Based on Suspect Window., , and . VTS, page 85-90. IEEE Computer Society, (2009)Comparative Study of CNN and LSTM based Attention Neural Networks for Aspect-Level Opinion Mining., , , and . BigData, page 2141-2150. IEEE, (2018)Distributed Top-k Subgraph Matching in A Big Graph., , , , , and . BigData, page 5325-5327. IEEE, (2018)Classification of autism spectrum disorder by combining brain connectivity and deep neural network classifier., , , , , and . Neurocomputing, (2019)QSA: Query Splitting-Based Anticollision for Mobile RFID-Based Internet-of-Things., , , and . IJDSN, (2013)Achieving high k-coverage and k-consistency in global alignment of multiple PPI networks., , , and . BIBM, page 303-307. IEEE, (2016)Analysis of the MAC protocol in low rate wireless personal area networks with bursty ON-OFF traffic., , , and . Concurrency and Computation: Practice and Experience, 25 (1): 85-93 (2013)Against Signed Graph Deanonymization Attacks on Social Networks., , , and . International Journal of Parallel Programming, 47 (4): 725-739 (2019)