Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Slope Stability Analysis and Soil Mechanical Properties of Impact Craters around the Lunar South Pole., , , and . Remote. Sens., 16 (2): 371 (January 2024)Quantifying the Influence of Websites Based on Online Collective Attention Flow., , , and . J. Comput. Sci. Technol., 30 (6): 1175-1187 (2015)Lattice-Based Programmable Hash Functions and Applications., , and . J. Cryptol., 37 (1): 4 (March 2024)Research and Implementation of Chinese Couplet Generation System With Attention-Based Transformer Mechanism., , , and . IEEE Trans. Comput. Soc. Syst., 9 (4): 1020-1028 (2022)PRE: Stronger security notions and efficient construction with non-interactive opening., , and . Theor. Comput. Sci., (2014)Non-stationary sources separation based on maximum likelihood criterion using source temporal-spatial model., , , and . Neurocomputing, (2018)Radiomics-Dosiomics-Contouromics Collaborative Learning for Adaptive Radiotherapy Eligibility Prediction in Nasopharyngeal Carcinoma., , , , , and . BIBM, page 3991-3997. IEEE, (2023)Repeatability of Radiomic Features Against Simulated Scanning Position Stochasticity Across Imaging Modalities and Cancer Subtypes: A Retrospective Multi-institutional Study on Head-and-Neck Cases., , , , , , , , , and 3 other author(s). CMMCA@MICCAI, volume 13574 of Lecture Notes in Computer Science, page 21-34. Springer, (2022)Proxy Re-encryption with Unforgeable Re-encryption Keys., , and . CANS, volume 8813 of Lecture Notes in Computer Science, page 20-33. Springer, (2014)A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings., and . Inscrypt, volume 7537 of Lecture Notes in Computer Science, page 324-340. Springer, (2011)