Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Temporal Features in Data Streams from Multiple Wearable Devices., , and . CYBCONF, page 1-6. IEEE, (2017)Improving Smart Conference Participation Through Socially Aware Recommendation., , , , , and . IEEE Trans. Hum. Mach. Syst., 44 (5): 689-700 (2014)Ubiquitous computing for communications and broadcasting., , , and . Int. J. Commun. Syst., 25 (6): 689-690 (2012)Total Variation-Stokes Strategy for Sparse-View X-ray CT Image Reconstruction., , , , , , and . IEEE Trans. Medical Imaging, 33 (3): 749-763 (2014)Optimizing a Parameterized Plug-and-Play ADMM for Iterative Low-Dose CT Reconstruction., , , , , , , , and . IEEE Trans. Medical Imaging, 38 (2): 371-382 (2019)An Object-oriented Design and Push Web Server based Framework for Physical Object Interactions and Services., , , and . J. Softw., 3 (8): 34-41 (2008)An Efficient Smart Contract Vulnerability Detector Based on Semantic Contract Graphs Using Approximate Graph Matching., , , , , , and . IEEE Internet Things J., 10 (24): 21431-21442 (December 2023)KFRNN: An Effective False Data Injection Attack Detection in Smart Grid Based on Kalman Filter and Recurrent Neural Network., , , and . IEEE Internet Things J., 9 (9): 6893-6904 (2022)Variational LSTM Enhanced Anomaly Detection for Industrial Big Data., , , , and . IEEE Trans. Ind. Informatics, 17 (5): 3469-3477 (2021)A mobile intelligent negotiation agent embedded and hybrid architecture based online purchasing system., , and . Int. J. Wirel. Mob. Comput., 3 (4): 288-298 (2009)