Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proceedings of the 4th International Conference on Web Search and Web Data Mining, WSDM 2011, , and . WSDM 2011, Hong Kong, China, February 9-12, 2011, ACM (2011)Research on the method of kinematical error measurement of the micro-platform., , , , and . ICDIP, volume 8009 of SPIE Proceedings, page 80090M. SPIE, (2011)Improved Integral Attack on Reduced-Round Simeck., , and . IEEE Access, (2019)Throughput Analysis of Opportunistic Feedback for Downlink Multiuser Diversity with Capture Effect., , and . IEEE Communications Letters, 16 (1): 44-46 (2012)Innovative Talent Cultivation Pattern of Software Engineering under Internet Plus., , , , and . ICCSE, page 180-183. IEEE, (2019)Coordinate Transformation-Based Nonlinear Power Decoupling Control for Differential Buck Grid-Tied Inverter., , , , and . IEEE Trans. Ind. Electron., 70 (12): 12201-12210 (2023)Learning a Robust Relevance Model for Search Using Kernel Methods., , , and . J. Mach. Learn. Res., (2011)A Proxy Re-Encryption Scheme Based on Elliptic Curve Group., , , and . J. Inf. Hiding Multim. Signal Process., 8 (1): 218-227 (2017)Medical Image Encryption Based on Stream Cipher Algorithm and Krill Group., , , and . Int. J. Netw. Secur., 22 (2): 314-320 (2020)Research on Medical Image Encryption Method Based on Improved Krill Herb Algorithm and Chaotic Systems., , , , and . Int. J. Netw. Secur., 22 (3): 484-489 (2020)