Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Neural networks trained with high-dimensional functions approximation data in high-dimensional space., , , , , , and . J. Intell. Fuzzy Syst., 41 (2): 3739-3750 (2021)Secure Cloud Data Deduplication with Efficient Re-Encryption., , , , , and . IEEE Trans. Serv. Comput., 15 (1): 442-456 (2022)First-Person Daily Activity Recognition With Manipulated Object Proposals and Non-Linear Feature Fusion., , , , , and . IEEE Trans. Circuits Syst. Video Techn., 28 (10): 2946-2955 (2018)An efficient traceable data sharing scheme in cloud computing for mobile devices., , and . IJHPCN, 12 (2): 156-165 (2018)Large universe multi-authority attribute-based PHR sharing with user revocation., , , and . Int. J. Comput. Sci. Eng., 19 (3): 376-386 (2019)On the Zero Forcing Number and Spectral Radius of Graphs., , , and . Electron. J. Comb., (2022)Spatial Compression for Fronthaul-Constrained Uplink Receiver in 5G Systems., , , and . WCNC, page 1-6. IEEE, (2019)Receiver design for OFDM-CDMA systems with multiplexed STBC., , and . PIMRC, page 2420-2424. IEEE, (2005)An Effective Cloud-Based Active Defense System against Malicious Codes., , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 690-695. Springer, (2014)An Associated Deletion Scheme for Multi-copy in Cloud Storage., , , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 511-526. Springer, (2018)