Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigating Interdiction Risk with Fortification., , and . Oper. Res., 68 (2): 348-362 (2020)E-government recommendation algorithm based on probabilistic semantic cluster analysis in combination of improved collaborative filtering in big-data environment of government affairs., , , , and . Personal and Ubiquitous Computing, 23 (3-4): 475-485 (2019)Matrix decomposition based threshold orthogonal matching pursuit algorithm for parameter and time delay identification of MISO-FIR systems., and . IECON, page 6285-6290. IEEE, (2017)An improved section-wise exploiting modification direction method., , , , , and . Signal Process., 90 (11): 2954-2964 (2010)Blind optimum detector for robust image watermarking in nonsubsampled shearlet Domain., , , , and . Inf. Sci., (2016)An efficient local Chan-Vese model for image segmentation., , and . Pattern Recognit., 43 (3): 603-618 (2010)Near-optimal solution to pair-wise LSB matching via an immune programming strategy., , and . Inf. Sci., 180 (8): 1201-1217 (2010)QoS Differentiated Adaptive Scheduled Optical Burst Switching for Grid Networks., and . GridNets, volume 2 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 43-55. Springer, (2008)A Multi-State Diagnosis and Prognosis Framework with Feature Learning for Tool Condition Monitoring., , , , , , , and . CoRR, (2018)Risk-Averse Stochastic Convex Bandit., and . CoRR, (2018)