Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Deployment of Wireless Sensor Networks by Biogeography Based Optimization Algorithm., , , , and . J. Sens. Actuator Networks, 1 (2): 86-96 (2012)A new improved krill herd algorithm for global numerical optimization., , , , and . Neurocomputing, (2014)Two-stage aware attentional Siamese network for visual tracking., , , , , and . Pattern Recognit., (2022)An Improved Cuckoo Search Algorithm With Stud Crossover for Chinese TSP Problem., , , , , and . Int. J. Cogn. Informatics Nat. Intell., 15 (4): 1-26 (2021)XML privacy protection model based on cloud storage., , and . Comput. Stand. Interfaces, 36 (3): 454-464 (2014)Trusted Query Method Based on Authorization Index and Triangular Matrix in Big Data., , and . ICBDS, volume 1210 of Communications in Computer and Information Science, page 392-401. Springer, (2019)Comprehensive Evaluation of Software Quality Based on LM-BP Neural Network., , , , and . DSA, page 162-167. IEEE, (2017)Chaotic Krill Herd algorithm., , , , and . Inf. Sci., (2014)Learned snakes for 3D image segmentation., , , , and . Signal Process., (2021)Security Analysis and Improvement on Kerberos Authentication Protocol., , and . ICBDS, volume 1210 of Communications in Computer and Information Science, page 199-210. Springer, (2019)