Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-user Forward Secure Dynamic Searchable Symmetric Encryption., , , and . NSS, volume 11058 of Lecture Notes in Computer Science, page 125-140. Springer, (2018)An Improved Apriori Algorithm Applied to Mining Ancient Chinese Poems., , , , and . CITS, page 1-5. IEEE, (2018)Similarity Measure based on Punishing Popular Items for Collaborative Filtering., , , , and . CITS, page 1-5. IEEE, (2018)Low Complexity Detection Algorithm for Generalized Precoding Aided Spatial Modulation., , , and . ICCC Workshops, page 163-166. IEEE, (2018)100Mbps Reconciliation for Quantum Key Distribution Using a Single Graphics Processing Unit., , , and . CoRR, (2020)Adaptive coordinated attitude control for spacecraft formation with saturating actuators and unknown inertia., and . J. Frankl. Inst., 356 (2): 1021-1037 (2019)Can Students Edit Their Learner Model Appropriately?., , , and . Intelligent Tutoring Systems, volume 5091 of Lecture Notes in Computer Science, page 674-676. Springer, (2008)A multi-objective optimization evolutionary algorithm incorporating preference information based on fuzzy logic., , , and . Comput. Optim. Appl., 46 (1): 159-188 (2010)Incremental small sphere and large margin for online recognition of communication jamming., , , , , and . Appl. Intell., 50 (10): 3429-3440 (2020)An energy sensitive system framework for cloud robotic network., , , , and . Int. J. Commun. Syst., (2019)