Author of the publication

A Semantic Knowledge Base Construction Method for Information Security.

, , , , , and . TrustCom, page 803-808. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Imbalanced Image Classification: A Generative Adversarial Network Ensemble Learning Method., , , and . IEEE Access, (2020)Detection Method of Focal Plane Arrays With Noise Suppression for Optical Communications., , , , , , and . IEEE Access, (2021)A Video Streaming Encryption Method and Experimental System Based on Reconfigurable Quaternary Logic Operators., , , , , and . IEEE Access, (2024)Object representation enhancement for self-supervised colocalization., , , and . Int. J. Intell. Syst., 37 (11): 8277-8290 (2022)Joint Graph Learning and Matching for Semantic Feature Correspondence., , , , , and . Pattern Recognit., (2023)View-specific subspace learning and re-ranking for semi-supervised person re-identification., , , , and . Pattern Recognit., (2020)Improved I-nice clustering algorithm based on density peaks mechanism., , , , and . Inf. Sci., (2021)Flexible Error Diffusion Algorithm for Binary Defocusing Fringe Projection Profilometry., , , , , , and . IEEE Trans. Instrum. Meas., (2023)Energy-Efficient Scheduling of Distributed Flow Shop With Heterogeneous Factories: A Real-World Case From Automobile Industry in China., , , and . IEEE Trans. Ind. Informatics, 17 (10): 6687-6696 (2021)Collaborative Filter Pruning for Efficient Automatic Surface Defect Detection., , , , , and . IEEE Trans. Ind. Informatics, 20 (2): 2177-2189 (February 2024)