Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guaranteed Rate of Return for Excess Investment in a Fuzzy Portfolio Analysis., , and . Int. J. Fuzzy Syst., 23 (1): 94-106 (2021)SIRSE: A secure identity recognition scheme based on electroencephalogram data with multi-factor feature., , , , and . Comput. Electr. Eng., (2018)Speaker Diaphragm Excursion Prediction: Deep Attention and Online Adaptation., , , , , and . ICASSP, page 1-5. IEEE, (2023)YinMem: A distributed parallel indexed in-memory computation system for large scale data analytics., , , , and . IEEE BigData, page 214-222. IEEE Computer Society, (2016)Attributes affecting the application of energy saving measures - A Chongqing study., , and . ICCI*CC, page 446-453. IEEE Computer Society, (2013)Using Methods of Association Rules Mining Optimizationin in Web-Based Mobile-Learning System., , , and . ISECS, page 967-970. IEEE Computer Society, (2008)A Scalable System for Community Discovery in Twitter During Hurricane Sandy., , , and . CCGRID, page 893-899. IEEE Computer Society, (2014)Traffic Flow Prediction Based on Deep Neural Networks., , , , and . ICDM Workshops, page 210-215. IEEE, (2019)A database-based distributed computation architecture with Accumulo and D4M: An application of eigensolver for large sparse matrix., , and . IEEE BigData, page 2493-2500. IEEE Computer Society, (2015)Weaknesses in a dynamic ID-based remote user authentication scheme for multi-server environment., and . Int. J. Electron. Secur. Digit. Forensics, 4 (1): 43-53 (2012)