Author of the publication

An integrated method for evaluating and predicting long-term operation safety of concrete dams considering lag effect.

, , , , and . Eng. Comput., 37 (4): 2505-2519 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Large delay underwater sensor networks clock synchronization with mobile beacon., , and . WCNC Workshops, page 211-215. IEEE, (2013)An integrated method for evaluating and predicting long-term operation safety of concrete dams considering lag effect., , , , and . Eng. Comput., 37 (4): 2505-2519 (2021)An Effective Occlusion Edge Prediction Method in Light Field Depth Estimation., , , , , and . FCS, volume 1286 of Communications in Computer and Information Science, page 403-416. Springer, (2020)Intraoperative Imaging Research for Paraclinoid Aneurysms Using the Indocyanine Green Angiography Technique., , , and . J. Medical Imaging Health Informatics, 9 (2): 235-241 (2019)Secure Steganographic Cover Generation via a Noise-Optimization Stacked StyleGAN2., , , , , and . Symmetry, 15 (5): 979 (April 2023)Why do social media users follow tourism-related posts? Roles of bloggers and posts in trip planning., , , , , and . Ind. Manag. Data Syst., 123 (12): 3080-3108 (2023)Multi-resolution Steganalysis of JPEG Images Using the Contrast of DCT Coefficients., , , and . FCS, volume 1286 of Communications in Computer and Information Science, page 628-640. Springer, (2020)A Privacy-Sensitive Approach for Group Convergence in Location-Based Services., , and . CW, page 1-8. IEEE Computer Society, (2016)Reversible data hiding in encrypted images with auxiliary syndrome., , and . ISPACS, page 237-241. IEEE, (2017)Locally Centralizing Samples for Nearest Neighbors., , , and . PRICAI, volume 6230 of Lecture Notes in Computer Science, page 687-692. Springer, (2010)