Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity-based construction for secure and efficient handoff authentication schemes in wireless networks., , , and . Security and Communication Networks, 5 (10): 1121-1130 (2012)Consensus-based distributed control for economic dispatch problem with comprehensive constraints in a smart grid., , and . EAI Endorsed Trans. Energy Web, 1 (2): e3 (2014)Exploring the complementarity of THz pulse imaging and DCE-MRIs: Toward a unified multi-channel classification and a deep learning framework., , , , and . Computer Methods and Programs in Biomedicine, (2016)DC Coefficients Recovery-based Error Concealment Technique for Mpeg-2 Video Streams., , and . WAA, page 85-90. World Scientific, (2003)UIO-based Testbed Augmentation for Simulating Cyber-Physical Systems, , , , , and . IEEE Intelligent Systems, (2018)Closed-loop control of product properties in metal forming, , , , , , , , , and . 66th General Assembly of CIRP, 65, 2, page 573-596. Oxford, Elsevier, (2016)Handwritten Numeral and Machine Printed Multiple Font Character Recognition using Neural Network Classifier., , and . Journal of Circuits, Systems, and Computers, 6 (6): 569-580 (1996)Application of statistical process control in injection mould manufacturing., , and . Int. J. Computer Integrated Manufacturing, 20 (5): 436-451 (2007)An Autonomic Agent Trust Model for IoT systems., , and . EUSPN/ICTH, volume 21 of Procedia Computer Science, page 107-113. Elsevier, (2013)Single-Event Upset Responses of Dual- and Triple-Well D Flip-Flop Designs in 7-nm Bulk FinFET Technology., , , , , , and . IRPS, page 1-5. IEEE, (2019)