Author of the publication

Using Risk Dominance Strategy in Poker.

, , , , and . J. Inf. Hiding Multim. Signal Process., 5 (3): 555-566 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key based Reducer Placement for Data Analytics across Data Centers Considering Bi-level Resource Provision in Cloud Computing., , , , and . IoTBD, page 243-254. SciTePress, (2016)Improved publicly verifiable auditing protocol for cloud storage., , , , , and . Concurr. Comput. Pract. Exp., (2021)Using Risk Dominance Strategy in Poker., , , , and . J. Inf. Hiding Multim. Signal Process., 5 (3): 555-566 (2014)Improvement of a Distributed Algorithm for Solving Linear Equations., , and . IEEE Trans. Ind. Electron., 64 (4): 3113-3117 (2017)Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design., , , , , , , , , and . Quantum Inf. Process., 13 (6): 1425-1435 (2014)Dynamic Attribute-Based Access Control in Cloud Storage Systems., , , , , and . Trustcom/BigDataSE/ISPA, page 129-137. IEEE, (2016)Low-cost wireless phase calibration that works on COTS RFID systems: poster., , , , , and . MobiCom, page 439-440. ACM, (2016)TransMVU: Multi-view 2D U-Nets with transformer for brain tumour segmentation., , , and . IET Image Process., 17 (6): 1874-1882 (May 2023)Machinery New Emerge Fault Diagnosis Based on Deep Convolution Variational Autoencoder and Adaptive Label Propagation., and . IEEE Access, (2022)Enhanced Discriminate Feature Learning Deep Residual CNN for Multitask Bearing Fault Diagnosis With Information Fusion., , , , and . IEEE Trans. Ind. Informatics, 19 (1): 762-770 (2023)