Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measurement of soil water content using ground-penetrating radar: a review of current methods., , , , , and . Int. J. Digital Earth, 12 (1): 95-118 (2019)A Privacy-Preserving Principal Component Analysis Outsourcing Framework., , , and . TrustCom/BigDataSE, page 1354-1359. IEEE, (2018)A lightweight privacy and integrity preserving range query scheme for mobile cloud computing., , , , and . Computers & Security, (2019)Adversarial Examples: Attacks on Machine Learning-based Malware Visualization Detection Methods., , , and . CoRR, (2018)Detection of Root Orientation Using Ground-Penetrating Radar., , , , , and . IEEE Trans. Geoscience and Remote Sensing, 56 (1): 93-104 (2018)Optimization of Intelligent Compactness Control Rule of Vibratory Roller Based on Genetic Algorithm Method., , , , , and . NCM, page 1943-1947. IEEE Computer Society, (2009)Stability Criteria for Constant Power Loads With Multistage Filters., , , and . IEEE Trans. Vehicular Technology, 60 (5): 2042-2049 (2011)Virtual Network Embedding Based on Topology Potential., , and . Entropy, 20 (12): 941 (2018)ATMPA: attacking machine learning-based malware visualization detection methods via adversarial examples., , , and . IWQoS, page 38:1-38:10. ACM, (2019)