ORCID as entered in ROS

Select Publications
2008, 'Welcome message from the program chairs', in Proceedings International Symposium on Computer Science and Its Applications Csa 2008, pp. 11, http://dx.doi.org/10.1109/CSA.2008.5
,2005, 'H-infinity design for a sonar-platform', in TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, IEEE, AUSTRALIA, Melbourne, pp. 2163 - 2168, presented at IEEE Region 10 Conference (TENCON 2005), AUSTRALIA, Melbourne, 21 November 2005 - 24 November 2005, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000246608903103&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2005, 'Modelling of SACK TCP and application to the HTTP file transfer environment', in LCN 2005: 30TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, IEEE COMPUTER SOC, AUSTRALIA, Sydney, pp. 515 - 516, presented at 30th Annual IEEE Conference on Local Computer Networks, AUSTRALIA, Sydney, 15 November 2005 - 17 November 2005, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000235161300080&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2003, 'Intrusion detection based on data mining', in Iceis 2003 Proceedings of the 5th International Conference on Enterprise Information Systems, pp. 341 - 346
,2003, 'Simulation study of TCP performance over mobile IPv4 and Mobile IPv6', in Iceis 2003 Proceedings of the 5th International Conference on Enterprise Information Systems, pp. 224 - 231
,1999, 'Adaptive real-time control of a christmas tree using a novel signal processing approach', in Proceedings of the American Control Conference, pp. 2526 - 2530
,1999, 'Investigation of signal replication techniques for road simulators: A quarter-car case study', in Proceedings of the American Control Conference, pp. 3178 - 3179
,1999, 'Practical H∞ weighting functions and their application to real-time control of a pilot plant', in Proceedings of the American Control Conference, pp. 920 - 924
,1999, 'Robust adaptive equalization using the filtered-X LMS algorithm', in Isspa 1999 Proceedings of the 5th International Symposium on Signal Processing and Its Applications, pp. 419 - 422, http://dx.doi.org/10.1109/ISSPA.1999.818201
,1996, 'Practical approach to selecting weighting functions for H∞ control and its application to a pilot plant', in IEE Conference Publication, pp. 998 - 1003
,1993, 'CONJUGATION AND H-INFINITY-CONTROL OF DISCRETE-TIME-SYSTEMS', in Yuan BZ (ed.), TENCON '93: 1993 IEEE REGION 10 CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND POWER ENGINEERING, VOL 4, INT ACADEMIC PUBL, PEOPLES R CHINA, BEIJING, pp. 467 - 470, presented at TENCON 93 - 1993 IEEE Region 10 Conference on Computer, Communication, Control and Power Engineering, PEOPLES R CHINA, BEIJING, 19 October 1993 - 21 October 1993, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:A1993BA40V00113&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1993, 'ROBUST PERFORMANCE CONTROL AND ANALYSIS OF ILL-CONDITIONED PLANTS', in Yuan BZ (ed.), TENCON '93: 1993 IEEE REGION 10 CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND POWER ENGINEERING, VOL 4, INT ACADEMIC PUBL, PEOPLES R CHINA, BEIJING, pp. 238 - 240, presented at TENCON 93 - 1993 IEEE Region 10 Conference on Computer, Communication, Control and Power Engineering, PEOPLES R CHINA, BEIJING, 19 October 1993 - 21 October 1993, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:A1993BA40V00057&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1993, 'SIMPLIFYING DISCRETE-TIME H-INFINITY CONTROL', in Yuan BZ (ed.), TENCON '93: 1993 IEEE REGION 10 CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND POWER ENGINEERING, VOL 4, INT ACADEMIC PUBL, PEOPLES R CHINA, BEIJING, pp. 471 - 473, presented at TENCON 93 - 1993 IEEE Region 10 Conference on Computer, Communication, Control and Power Engineering, PEOPLES R CHINA, BEIJING, 19 October 1993 - 21 October 1993, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:A1993BA40V00114&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2013, Guest editorial: Special issue on green telecommunications, http://dx.doi.org/10.1007/s11235-011-9637-7
,2023, A Robust Policy Bootstrapping Algorithm for Multi-objective Reinforcement Learning in Non-stationary Environments, http://dx.doi.org/10.48550/arxiv.2308.09734
,2022, PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-model Transmission Systems, http://dx.doi.org/10.1109/OJCS.2022.3199755
,2022, Pair-Relationship Modeling for Latent Fingerprint Recognition, http://arxiv.org/abs/2207.00587v1
,2022, FingerGAN: A Constrained Fingerprint Generation Scheme for Latent Fingerprint Enhancement, http://arxiv.org/abs/2206.12885v1
,2022, A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications, http://dx.doi.org/10.1109/JIOT.2022.3204246
,2022, Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems, http://dx.doi.org/10.48550/arXiv.2203.16730
,2020, Designing False Data Injection attacks penetrating AC-based Bad Data Detection System and FDI Dataset generation, http://arxiv.org/abs/2003.05071v1
,2020, Designing constraint-based false data injection attacks against the unbalanced distribution smart grids, http://dx.doi.org/10.48550/arxiv.2003.05088
,2019, Online Structured Sparsity-based Moving Object Detection from Satellite Videos, http://dx.doi.org/10.1109/TGRS.2020.2976855
,2019, Error Bounded Foreground and Background Modeling for Moving Object Detection in Satellite Videos, http://dx.doi.org/10.1109/TGRS.2019.2953181
,2018, IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks, http://dx.doi.org/10.48550/arxiv.1810.03323
,2018, Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection, http://dx.doi.org/10.48550/arxiv.1809.07912
,2017, From Deep to Shallow: Transformations of Deep Rectifier Networks, http://dx.doi.org/10.48550/arxiv.1703.10355
,