Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Randomness invalidates criminal smart contracts., , , , , and . Inf. Sci., (2019)Aggregating Dual Attention Residual Network and Convolutional Sparse Autoencoder to Enhance the Diagnosis of Alzheimer's Disease., , , , , , , and . HCCS, page 1-6. IEEE, (2023)An Online Special Terminology Interpreting System for Bilingual Instruction., and . WBL, volume 5328 of Lecture Notes in Computer Science, page 25-34. Springer, (2008)Lightweight Encryption Algorithm Containing SPN Structure for IoT., , , , and . CSS (2), volume 11983 of Lecture Notes in Computer Science, page 253-262. Springer, (2019)PFDup: Practical Fuzzy Deduplication for Encrypted Multimedia Data., , , , and . J. Ind. Inf. Integr., (2024)A Virtual Network Resource Allocation Model Based on Dynamic Resource Pricing., , , and . IEEE Access, (2020)A Password Strength Evaluation Algorithm based on Sensitive Personal Information., , , and . TrustCom, page 1542-1545. IEEE, (2020)Reversible Network Iterative Construct Method Based on the Cascade Operation., , and . ITNG, page 1202-1205. IEEE Computer Society, (2008)An Ajax-Based Terminology System for E-Learning 2.0., , and . Edutainment, volume 5093 of Lecture Notes in Computer Science, page 135-146. Springer, (2008)A Speech Based Algorithm for Watermarking Relational Databases., , and . ISIP, page 603-606. IEEE Computer Society, (2008)