Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Developing a data model for understanding geographical analysis models with consideration of their evolution and application processes., , , , , and . Trans. GIS, 22 (6): 1498-1521 (2018)Location-restricted Services Access Control Leveraging Pinpoint Waveforming., , , and . ACM Conference on Computer and Communications Security, page 292-303. ACM, (2015)Block coordinate descentwith time perturbation for nonconvex nonsmooth problems in real-world studies., , , , and . Frontiers Inf. Technol. Electron. Eng., 20 (10): 1390-1403 (2019)Yoyo trick on type-II generalised Feistel networks., and . IET Inf. Secur., 15 (6): 457-471 (2021)Location Recommendation for Enterprises by Multi-Source Urban Big Data Analysis., , , , , , and . IEEE Trans. Serv. Comput., 13 (6): 1115-1127 (2020)Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation., , , and . IEEE/ACM Trans. Netw., 29 (6): 2779-2792 (2021)FR-DETR: End-to-End Flowchart Recognition With Precision and Robustness., , and . IEEE Access, (2022)Fractional Fourier transform based auditory feature for language identification., , , and . APCCAS, page 209-212. IEEE, (2008)Teamwork-oriented integrated modeling method for geo-problem solving., , , , , , , , and . Environ. Model. Softw., (2019)Computing Zigzag Vineyard Efficiently Including Expansions and Contractions., and . CoRR, (2023)