Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discovering shapelets with key points in time series classification., , and . Expert Syst. Appl., (2019)ESPSA: A prediction-based algorithm for streaming time series segmentation., , , , and . Expert Syst. Appl., 41 (14): 6098-6105 (2014)A privacy protection approach for XML-based archives management in a cloud environment., , , and . Electron. Libr., 37 (6): 970-983 (2019)Stimulating trust cooperation in edge services: An evolutionary tripartite game., , , , and . Eng. Appl. Artif. Intell., (2022)Selecting Valuable Customers for Merchants in E-Commerce Platforms., , , , and . ICDM, page 1281-1286. IEEE Computer Society, (2016)A projective clustering algorithm based on significant local dense areas., , , , , and . IJCNN, page 1-8. IEEE, (2012)Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation., , , , and . IEEE Trans. Serv. Comput., 11 (3): 493-506 (2018)Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems., , , , , and . Expert Syst. Appl., (September 2023)A Barrage Sentiment Analysis Scheme Based on Expression and Tone., , , , , and . IEEE Access, (2019)Privacy-Protection Path Finding Supporting the Ranked Order on Encrypted Graph in Big Data Environment., , , , , , and . IEEE Access, (2020)