Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Adherence to Cognitive Behavioral Therapy for Insomnia through Machine and Social Persuasion., , , , , , , , , and 3 other author(s). GreenCom/iThings/CPScom, page 750-757. IEEE, (2013)Viewpoint selection for vision systems in industrial inspection., , and . ICRA, page 4934-4939. IEEE, (2014)ASP: A Fast Adversarial Attack Example Generation Framework based on Adversarial Saliency Prediction., , and . CoRR, (2018)Towards Robust Training of Neural Networks by Regularizing Adversarial Gradients., , , , and . CoRR, (2018)Optimal Power Allocation for OFDM-Based Wire-Tap Channels with Arbitrarily Distributed Inputs., , , , and . WICON, volume 98 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 192-203. Springer, (2011)Investigations on material removal rate and surface roughness of meso gear by micro wire-EDM., , and . IJMR, 13 (2): 134-150 (2018)A systematic survey on automated concurrency bug detection, exposing, avoidance, and fixing techniques, , , and . Software Quality Journal, 26 (3): 855--889 (Sep 1, 2018)Fatiguing Effects on the Multi-Scale Entropy of Surface Electromyography in Children with Cerebral Palsy., , , , and . Entropy, 18 (5): 177 (2016)LanCe: A Comprehensive and Lightweight CNN Defense Methodology against Physical Adversarial Attacks on Embedded Multimedia Applications., , and . CoRR, (2019)Background Subtraction With Real-Time Semantic Segmentation., , , , and . IEEE Access, (2019)