Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device., , , , , , , and . IEEE Access, (2018)A Note on Dependence of Epidemic Threshold on State Transition Diagram in the SEIC Cybersecurity Dynamical System Model., and . SciSec, volume 11287 of Lecture Notes in Computer Science, page 51-64. Springer, (2018)Automatic Identification of Ineffective Online Student Questions in Computing Education., , , , and . FIE, page 1-5. IEEE, (2018)From one tree to a forest: a unified solution for structured web data extraction., , , and . SIGIR, page 775-784. ACM, (2011)Data Communication Security Based on Novel Reversible Mean Shift Steganography Algorithm., , , , , , , and . ICCE, page 1-5. IEEE, (2019)A Method Converting Cone Into Sculling Algorithm for Strapdown Inertial Navigation System., , , , and . IEEE Access, (2019)Improved Path Planning for Indoor Patrol Robot Based on Deep Reinforcement Learning., , , , and . Symmetry, 14 (1): 132 (2022)Virtual ads insertion in street building views for augmented reality., , and . ICIP, page 1117-1120. IEEE, (2011)3D visual phrases for landmark recognition., , , , , and . CVPR, page 3594-3601. IEEE Computer Society, (2012)Consuming, sharing, and creating content: How young students use new social media in and outside school., , and . Computers in Human Behavior, (2016)