Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Privacy-Preserving Mutual Authenticated Key Agreement Scheme in Roaming Service for Global Mobility Networks., , , and . IEEE Syst. J., 13 (2): 1454-1465 (2019)Finite-Time Synchronization of Multi-Linked Memristor-Based Neural Networks With Mixed Time-Varying Delays., , , , and . IEEE Access, (2020)Parameters estimation and synchronization of uncertain coupling recurrent dynamical neural networks with time-varying delays based on adaptive control., , , , , and . Neural Comput. Appl., 30 (7): 2217-2227 (2018)A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme., , , , , and . J. Inf. Secur. Appl., (June 2023)An effective algorithm for the spark of sparse binary measurement matrices., , , and . Appl. Math. Comput., (2020)Flexible construction of measurement matrices in compressed sensing based on extensions of incidence matrices of combinatorial designs., , , , and . Appl. Math. Comput., (2022)Price optimization under the extended nested logit model., , , and . Oper. Res. Lett., 51 (1): 54-59 (January 2023)Intrusion Detection Method Based on Complementary Adversarial Generation Network., , and . ICSI (2), volume 13969 of Lecture Notes in Computer Science, page 260-271. Springer, (2023)Improving Chaotic Ant Swarm Performance with Three Strategies., , and . ICSI (1), volume 7928 of Lecture Notes in Computer Science, page 268-277. Springer, (2013)Integer Programming via Chaotic Ant Swarm., , , and . ICNC (4), page 489-493. IEEE Computer Society, (2007)