Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An identity-based proxy re-encryption for data deduplication in cloud., , , , and . J. Syst. Archit., (2021)Quantum Computing and Machine Learning on an Integrated Photonics Platform., , , , , , , , and . Inf., 15 (2): 95 (February 2024)Real-time sentiment analysis of students based on mini-Xception architecture for wisdom classroom., , , and . Concurr. Comput. Pract. Exp., (2022)NAGNet: A novel framework for real-time students' sentiment analysis in the wisdom classroom., , , , and . Concurr. Comput. Pract. Exp., (2023)Real-Time Anomaly Detection With HMOF Feature., , , , , and . CoRR, (2018)HRDoc: Dataset and Baseline Method toward Hierarchical Reconstruction of Document Structures., , , , , , and . AAAI, page 1870-1877. AAAI Press, (2023)Dynamic hierarchical quantum secret sharing with general access structure., , , , and . Quantum Inf. Process., 22 (8): 320 (August 2023)Centralizer's applications to the inverse along an element., , , and . Appl. Math. Comput., (2017)Abnormal Behavior Detection Based on Target Analysis., , , , and . CoRR, (2021)Heterogeneous online/offline signcryption for secure communication in Internet of Things., , , , , and . J. Syst. Archit., (2022)