Author of the publication

Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of Things.

, , , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conceptual Biology Research Supporting Platform: Current Design and Future Directions., , , and . Applications of Computational Intelligence in Biology, volume 122 of Studies in Computational Intelligence, Springer, (2008)On discovering "potentially useful" patterns from databases., , , and . GrC, page 494-497. IEEE, (2006)Hyper-Textual Language Model for Web Information Retrieval., , and . GrC, page 68-73. IEEE, (2008)Optimal Dynamic Assignment of Internal Vehicle Fleet at a Maritime Rail Terminal with Uncertain Processing Times., and . OR, page 343-349. Springer, (2016)Deep Embedding Kernel., and . CoRR, (2018)The learning system of collective behavior in students' social network., , and . Comput. Electr. Eng., 39 (8): 2521-2530 (2013)Fuzzy decision support system for demand forecasting with a learning mechanism., , and . Fuzzy Sets Syst., 157 (12): 1713-1725 (2006)Near-optimal dynamic priority scheduling strategy for instance-intensive business workflows in cloud computing., , , , , and . Concurr. Comput. Pract. Exp., (2017)Modified Label Propagation on Manifold With Applications to Fault Classification.. IEEE Access, (2020)Representations for Large-Scale Sequence Data Mining: A Tale of Two Vector Space Models., , , and . RSFDGrC, volume 8170 of Lecture Notes in Computer Science, page 15-25. Springer, (2013)