Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Method for Improving Data Security in Register Files Based on Multiple Pipeline Restart., , , , and . IJITWE, 10 (3): 17-32 (2015)U-TRI: Unlinkability Through Random Identifier for SDN Network., , , and . MTD@CCS, page 3-15. ACM, (2017)A Semistructured Random Identifier Protocol for Anonymous Communication in SDN Network., , , , , and . Security and Communication Networks, (2018)DeepSeeNet: A deep learning model for automated classification of patient-based age-related macular degeneration severity from color fundus photographs., , , , , , , and . CoRR, (2018)BioSentVec: creating sentence embeddings for biomedical texts., , and . CoRR, (2018)ML-Net: multi-label classification of biomedical texts with deep neural networks., , , , , and . CoRR, (2018)A deep learning approach for automated detection of geographic atrophy from color fundus photographs., , , , , , , and . CoRR, (2019)Evaluation of Five Sentence Similarity Models on Electronic Medical Records., , , , and . BCB, page 533. ACM, (2019)Joint source-channel decoding for MPEG-4 video transmission over wireless channels., and . IEEE Journal on Selected Areas in Communications, 21 (10): 1780-1789 (2003)Distributed Finite Time Consensus of Second-Order Multi-Agent Systems via Pinning Control (August 2018)., , , and . IEEE Access, (2018)