Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Light-Weight and Privacy-Preserving Authentication Protocol for Mobile Payments in the Context of IoT., , , and . IEEE Access, (2019)Hyperbolic polynomial uniform B-spline curves and surfaces with shape parameter., , , and . Graph. Model., 72 (1): 1-6 (2010)An intelligent system of on space surface modeling., , and . SMC (5), page 4290-4295. IEEE, (2004)Metadata-oriented Data Model Supporting Railway Distributed System Integration., , and . J. Softw., 7 (4): 814-822 (2012)A new approach to decision-making with key constraint and its application in enterprise information systems., , , and . Enterp. Inf. Syst., 2 (3): 287-308 (2008)Improving Binary Neural Networks through Fully Utilizing Latent Weights., , , , and . CoRR, (2021)Towards Fully Sparse Training: Information Restoration with Spatial Similarity., , , , and . AAAI, page 2929-2937. AAAI Press, (2022)Generative Zero-Shot Network Quantization., , , , , and . CVPR Workshops, page 3000-3011. Computer Vision Foundation / IEEE, (2021)A Contribution to Decision Tree Construction Based on Rough Set Theory., , and . Rough Sets and Current Trends in Computing, volume 3066 of Lecture Notes in Computer Science, page 637-642. Springer, (2004)An Extended Affinity Propagation Clustering Method Based on Different Data Density Types., and . Comput. Intell. Neurosci., (2015)