Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-assisted complete analysis of three-photon hyperentangled Greenberger-Horne-Zeilinger states with nitrogen-vacancy centers in microcavities., , and . Quantum Inf. Process., 17 (7): 172 (2018)Creating real body model of dressed human based on fat extent of body., , , , and . Multimedia Tools Appl., 74 (17): 6951-6966 (2015)Long-Lasting Nanophosphors Applied to UV-Resistant and Energy Storage Perovskite Solar Cells, , , , , , , , , and . Advanced Energy Materials, (2017)Trust and Reputation Evaluation Mechanisms in Grid Computing: A Review., and . MobiMedia, page 24-33. ACM, (2016)Context-Aware Verifiable Cloud Computing., , and . IEEE Access, (2017)Secure Pervasive Social Communications Based on Trust in a Distributed Way., , , and . IEEE Access, (2016)Distributed Model Predictive Control of Linear Systems with Coupled Constraints Based on Collective Neurodynamic Optimization., , and . Australasian Conference on Artificial Intelligence, volume 11320 of Lecture Notes in Computer Science, page 318-328. Springer, (2018)Encrypted Big Data Deduplication in Cloud Storage., , , , , and . Smart Data, Chapman and Hall/CRC, (2019)A Survey on Future Internet Security Architectures., , and . IEEE Access, (2016)Heterogeneous Data Storage Management with Deduplication in Cloud Computing., , , and . IEEE Trans. Big Data, 5 (3): 393-407 (2019)