Author of the publication

Speed Up Big Data Analytics by Unveiling the Storage Distribution of Sub-Datasets.

, , , , , and . IEEE Trans. Big Data, 4 (2): 231-244 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deister: A light-weight autonomous block management in data-intensive file systems using deterministic declustering distribution., , , , , , and . J. Parallel Distributed Comput., (2017)Wireless sensor network intrusion detection system based on MK-ELM., , , and . Soft Comput., 24 (16): 12361-12374 (2020)A Feedback Semi-Supervised Learning With Meta-Gradient for Intrusion Detection., , and . IEEE Syst. J., 17 (1): 1158-1169 (March 2023)RICNN: A ResNet&Inception convolutional neural network for intrusion detection of abnormal traffic., , , and . Comput. Sci. Inf. Syst., 19 (1): 309-326 (2022)Privacy-preserving multi-authority attribute-based encryption with dynamic policy updating in PHR., , , and . Comput. Sci. Inf. Syst., 16 (3): 831-847 (2019)K maximum probability attack paths dynamic generation algorithm., , and . Comput. Sci. Inf. Syst., 13 (2): 677-689 (2016)Network abnormal traffic detection method based on fusion of chord similarity and multiple loss encoder., , , , and . EURASIP J. Wirel. Commun. Netw., 2022 (1): 105 (2022)Fabric-GC: A Blockchain-based Gantt Chart System for Cross-organizational Project Management., , , , , and . CoRR, (2022)LWE-based multi-authority attribute-based encryption scheme with hidden policies., , , and . Int. J. Comput. Sci. Eng., 19 (2): 233-241 (2019)Local self-attention in transformer for visual question answering., , , , , and . Appl. Intell., 53 (13): 16706-16723 (July 2023)