Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hybrid Trust Evaluation Framework for E-Commerce in Online Social Network: A Factor Enrichment Perspective., , , , and . IEEE Access, (2017)A Novel Trust Management Scheme for Defending Against On-Off Attack Based on Gaussian Distribution., , , , and . iThings/GreenCom/CPSCom/SmartData, page 1806-1811. IEEE, (2018)CART-based fast CU size decision and mode decision algorithm for 3D-HEVC., , , , , and . Signal Image Video Process., 13 (2): 209-216 (2019)The Algorithm for Detecting Hiding Information Based on SVM., , , and . ISNN (2), volume 3174 of Lecture Notes in Computer Science, page 681-687. Springer, (2004)Multiple clusters parts-based sparse representation for single example face identification., , and . J. Vis. Commun. Image Represent., (2016)Non-Contact Method of Heart Rate Using a Webcam., , , , and . iThings/GreenCom/CPSCom/SmartData, page 1902-1906. IEEE, (2018)Logical Events Graphs based Emotional Text Generation., , , , and . ICCCM, page 54-60. ACM, (2022)Multi-sensor activity recognition using 2DPCA and K-means clustering based on dual-measure distance., , and . RO-MAN, page 858-863. IEEE, (2017)Trust Traversal: A trust link detection scheme in social network., , , , and . Comput. Networks, (2017)不确定环境下基于SIFT算法和一类分类的火焰识别 (Flame Detection Based on SIFT Algorithm and One Class Classifier with Undetermined Environment)., , and . 计算机科学, 42 (Z6): 231-235 (2015)