Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Chaotic Searchable Image Encryption Scheme Integrating with Block Truncation Coding., and . ICCCS (3), volume 11065 of Lecture Notes in Computer Science, page 349-358. Springer, (2018)General process of big data analysis and visualisation., , , and . Int. J. Comput. Sci. Eng., 23 (2): 177-184 (2020)An evolutionary learning and network approach to identifying key metabolites for osteoarthritis., , , , , , and . PLoS Comput. Biol., (2018)Energy-aware run-time mapping for homogeneous NoC., , , , , and . SoC, page 8-11. IEEE, (2010)An Algorithm of Webpage Information Hiding Based on Class Selectors.. IITSI, page 691-694. IEEE Computer Society, (2010)An on-chip global broadcast network design with equalized transmission lines in the 1024-core era., , , , and . SLIP, page 11-18. ACM, (2012)Survey on streaming data computing system., , , , , and . ACM TUR-C, page 159:1-159:8. ACM, (2019)A Big Data Mining Approach of PSO-Based BP Neural Network for Financial Risk Management With IoT., , , , , and . IEEE Access, (2019)On the build and application of bank customer churn warning model., , , , and . Int. J. Comput. Sci. Eng., 22 (4): 404-419 (2020)A New Worst-Case Throughput Bound for Oblivious Routing in Odd Radix Mesh Network., , and . IEEE Comput. Archit. Lett., 12 (1): 9-12 (2013)