Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-assisted complete analysis of three-photon hyperentangled Greenberger-Horne-Zeilinger states with nitrogen-vacancy centers in microcavities., , and . Quantum Inf. Process., 17 (7): 172 (2018)Trust and Reputation Evaluation Mechanisms in Grid Computing: A Review., and . MobiMedia, page 24-33. ACM, (2016)Context-Aware Verifiable Cloud Computing., , and . IEEE Access, (2017)Secure Pervasive Social Communications Based on Trust in a Distributed Way., , , and . IEEE Access, (2016)Encrypted Big Data Deduplication in Cloud Storage., , , , , and . Smart Data, Chapman and Hall/CRC, (2019)Distributed Model Predictive Control of Linear Systems with Coupled Constraints Based on Collective Neurodynamic Optimization., , and . Australasian Conference on Artificial Intelligence, volume 11320 of Lecture Notes in Computer Science, page 318-328. Springer, (2018)Detection of Application-Layer Tunnels with Rules and Machine Learning., , and . SpaCCS, volume 11611 of Lecture Notes in Computer Science, page 441-455. Springer, (2019)Bayes-ToMoP: A Fast Detection and Best Response Algorithm Towards Sophisticated Opponents., , , , , and . AAMAS, page 2282-2284. International Foundation for Autonomous Agents and Multiagent Systems, (2019)A Dynamic Programming Model for Text Segmentation Based on Min-Max Similarity., , , , , and . AIRS, volume 4993 of Lecture Notes in Computer Science, page 141-152. Springer, (2008)An Empirical Comparison of FAISS and FENSHSES for Nearest Neighbor Search in Hamming Space., , and . CoRR, (2019)