Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hard fault analysis of Trivium., , and . Inf. Sci., (2013)On the Modified Transparency Order of n , m -Functions., , , and . Secur. Commun. Networks, (2021)A new soft tissue deformation model based on Runge-Kutta: Application in lung., , , and . Comput. Biol. Medicine, (2022)Poly-ABE: A traceable and revocable fully hidden policy CP-ABE scheme for integrated demand response in multi-energy systems., , , , , and . J. Syst. Archit., (October 2023)ABCrowdMed: A Fine-Grained Worker Selection Scheme for Crowdsourcing Healthcare With Privacy-Preserving., , , , , and . IEEE Trans. Serv. Comput., 16 (5): 3182-3195 (September 2023)Understanding Hard Negatives in Noise Contrastive Estimation., and . NAACL-HLT, page 1090-1101. Association for Computational Linguistics, (2021)Using Trust Metric to Detect Malicious Behaviors in WSNs., , , and . SNPD (3), page 104-108. IEEE Computer Society, (2007)Learning Multi-Graph Neural Network for Data-Driven Job Skill Prediction., , , , and . IJCNN, page 1-8. IEEE, (2021)Public-key encryption scheme with optimal continuous leakage resilience., , , , , , and . Inf. Process. Lett., (2023)The global avalanche characteristics of two Boolean functions and algebraic immunity., , , and . Int. J. Comput. Math., 89 (16): 2165-2179 (2012)