Author of the publication

A credible transfer method of cross-chain assets based on DID and VC.

, , , , , and . ICISCAE (IEEE), page 238-242. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep blind quality evaluator for multiply distorted images based on monogenic binary coding., , , , , and . J. Vis. Commun. Image Represent., (2019)Reliability-Based Design Optimization for Cloud Migration., , , , and . IEEE Trans. Serv. Comput., 7 (2): 223-236 (2014)Utilizing Dictionary Learning and Machine Learning for Blind Quality Assessment of 3-D Images., , and . TBC, 63 (2): 404-415 (2017)Blockchain in China., , , , and . Commun. ACM, 64 (11): 88-93 (2021)ESM2-Tree: An maintenance efficient authentication data structure in blockchain., , , , and . SSDBM, page 7:1-7:12. ACM, (2023)Automated Configuration Bug Report Prediction Using Text Mining., , , , and . COMPSAC, page 107-116. IEEE Computer Society, (2014)An Image-Based Quantized Compressive Sensing Scheme Using Zadoff-Chu Measurement Matrix., , , and . Sensors, 23 (2): 1016 (January 2023)Local and Global Feature Learning for Blind Quality Evaluation of Screen Content and Natural Scene Images., , , , , and . IEEE Trans. Image Process., 27 (5): 2086-2095 (2018)A Scaling Scheme for DCT Precoded Optical Intensity-Modulated Direct Detection Systems., , , , and . J. Electr. Comput. Eng., (2015)Segmenta: Pipelined BFT Consensus with Slicing Broadcast., , , , and . ICA3PP (3), volume 14489 of Lecture Notes in Computer Science, page 101-120. Springer, (2023)