Author of the publication

Resource-Oriented Petri Net-Based Approach to Deadlock Prevention of AMSs.

, , and . SMC, page 515-520. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secret Image Restoring Scheme Using Threshold Pairs of Unordered Image Shares., , , and . IEEE Access, (2019)Lossy trapdoor functions based on the PLWE., , , and . Clust. Comput., 22 (Supplement): 5647-5654 (2019)Small-Size Liveness-Enforcing Supervisor for Automated Manufacturing Systems Using the Theory of Transition Cover., , , , and . IEEE Trans. Syst. Man Cybern. Syst., 53 (4): 2222-2235 (April 2023)Polynomial-complexity robust deadlock controllers for a class of automated manufacturing systems with unreliable resources using Petri nets., , , , and . Inf. Sci., (2020)An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy., , and . Secur. Commun. Networks, (2019)Unordered Multisecret Sharing Based on Generalized Chinese Remainder Theorem., , , and . Secur. Commun. Networks, (2020)Detecting Steganography in JPEG Images Recompressed With the Same Quantization Matrix., , , , and . IEEE Trans. Circuits Syst. Video Technol., 32 (9): 6002-6016 (2022)Reversible Data Hiding Schemes in Encrypted Images Based on the Paillier Cryptosystem., , and . Int. J. Netw. Secur., 22 (3): 521-531 (2020)An adaptive approach of Feature Selection applied to Semi-Supervised Fuzzy Clustering., , , , , and . EITCE, page 723-727. ACM, (2020)A Novel (t, n) Secret Sharing Scheme Based upon Euler's Theorem., and . Secur. Commun. Networks, (2019)