Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discrete gradient methods and linear projection methods for preserving a conserved quantity of stochastic differential equations., , , and . Int. J. Comput. Math., 95 (12): 2511-2524 (2018)A compact ADI Crank-Nicolson difference scheme for the two-dimensional time fractional subdiffusion equation., , and . Int. J. Comput. Math., 95 (12): 2525-2538 (2018)TRUSTER: TRajectory Data Processing on ClUSTERs., , , and . DASFAA, volume 5463 of Lecture Notes in Computer Science, page 768-771. Springer, (2009)Cε-LDE: A lightweight variant of differential evolution algorithm with combined ε constrained method and Lévy flight for constrained optimization problems., , , , , and . Expert Syst. Appl., (2023)WAVE: Edge-Device Cooperated Real-Time Object Detection for Open-Air Applications., , , , , and . IEEE Trans. Mob. Comput., 22 (7): 4347-4357 (July 2023)WeExt: A Framework of Extending Deterministic Knowledge Graph Embedding Models for Embedding Weighted Knowledge Graphs., , , , , , and . IEEE Access, (2023)A probabilistic constant amplitude life diagram modeling method for composite materials considering spatial mapping relation., , , , and . Qual. Reliab. Eng. Int., 39 (5): 2027-2043 (July 2023)Cyber attack estimation and detection for cyber-physical power systems., , , , , , and . Appl. Math. Comput., (2021)SNS user classification and its application to obscure POI discovery., , and . Multim. Tools Appl., 76 (4): 5461-5487 (2017)Security cooperation model based on topology control and time synchronization for wireless sensor networks., , , , , , and . J. Commun. Networks, 21 (5): 469-480 (2019)