Author of the publication

Research on an Algorithm of Shape Motion Deblurring.

, , , , and . ICIC (1), volume 9225 of Lecture Notes in Computer Science, page 327-338. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Bayesian Network Structure Learning with Node Ordering via K2 Algorithm., , , , and . ICIC (2), volume 8589 of Lecture Notes in Computer Science, page 44-55. Springer, (2014)Research on an Algorithm of Shape Motion Deblurring., , , , and . ICIC (1), volume 9225 of Lecture Notes in Computer Science, page 327-338. Springer, (2015)Security Analysis for Hilbert Curve Based Spatial Data Privacy-Preserving Method., , , , and . HPCC/EUC, page 929-934. IEEE, (2013)A Secure and Targeted Mobile Coupon Delivery Scheme Using Blockchain., , , , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 538-548. Springer, (2018)An Efficient Snapshot Strategy for Dynamic Graph Storage Systems to Support Historical Queries., , , and . IEEE Access, (2020)Privacy-Preserving Linear Regression on Distributed Data by Homomorphic Encryption and Data Masking., , and . IEEE Access, (2020)Federated Learning with Positive and Unlabeled Data., , , , , , and . CoRR, (2021)Modelling autonomic and dynamic trust decision-making mechanism for large-scale open environments., and . Int. J. Comput. Appl. Technol., 36 (3/4): 297-307 (2009)GPTE: Efficient Graph Partitioning-based Traffic Engineering in Hybrid SDN/IP Networks., , , , , and . HPCC/DSS/SmartCity, page 958-966. IEEE, (2020)Secure Boolean Queries over Encrypted Data from Indistinguishability Obfuscation., , and . DSC, page 1-8. IEEE, (2019)