Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New q-ary Quantum MDS Codes with Distances Bigger than q/2., , and . CoRR, (2015)Study of Electronic Identity Authentication Model., and . ICEITSA, page 216-220. ACM, (2023)Using XML to improve the productivity and robustness in application development in geosciences., and . Comput. Geosci., 32 (10): 1646-1653 (2006)Deterministic Construction of RIP Matrices in Compressed Sensing from Constant Weight Codes., and . CoRR, (2015)Storage and Retrieval Codes in PIR Schemes with Colluding Servers., and . CoRR, (2022)New Constructions of Subspace Codes Using Subsets of MRD Codes in Several Blocks., , , and . IEEE Trans. Inf. Theory, 66 (9): 5317-5321 (2020)Improved Multiobjective Particle Swarm Optimization for Environmental/Economic Dispatch Problem in Power System., , and . ICSI (2), volume 6729 of Lecture Notes in Computer Science, page 49-56. Springer, (2011)Generalized Zero-Shot Learning with Noisy Labeled Data., , and . PRCV (11), volume 14435 of Lecture Notes in Computer Science, page 289-300. Springer, (2023)Active and Personalized Services in an Information Security Engineering Cloud Based on ISO/IEC 15408., , , , and . PAISI, volume 8440 of Lecture Notes in Computer Science, page 35-48. Springer, (2014)New Constant-Dimension Subspace Codes from Maximum Rank Distance Codes., and . IEEE Trans. Inf. Theory, 64 (9): 6315-6319 (2018)