Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Entropy-Based Self-Adaptive Node Importance Evaluation Method for Complex Networks., , and . Complex., (2020)Adaptive Online Packing-guided Search for POMDPs., , , , , , and . NeurIPS, page 28419-28430. (2021)An Image Denoising Algorithm Based on Singular Value Decomposition and Non-local Self-similarity., , , and . CSS (2), volume 11983 of Lecture Notes in Computer Science, page 501-510. Springer, (2019)Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols., , , , , and . Cryptogr., 8 (1): 6 (March 2024)A Security Detection Model for Selfish Mining Attack., , , and . BlockSys, volume 1156 of Communications in Computer and Information Science, page 185-195. Springer, (2019)A game-theoretic approach of mixing different qualities of coins., , , , , and . Int. J. Intell. Syst., 35 (12): 1899-1911 (2020)DCAM: Disturbed class activation maps for weakly supervised semantic segmentation., , , , and . J. Vis. Commun. Image Represent., (2023)ESM: Selfish mining under ecological footprint., , , , , and . Inf. Sci., (2022)How to achieve bidirectional zero-knowledge authentication?, , , , , , and . IACR Cryptol. ePrint Arch., (2023)Flicker-free field-sequential stereoscopic TV system compatible with current PAL system., , , and . VCIP, volume 2094 of SPIE Proceedings, SPIE, (1993)