Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Making Cloud Storage Integrity Checking Protocols Economically Smarter., , , , and . SmartCom, volume 10135 of Lecture Notes in Computer Science, page 297-306. Springer, (2016)Secret sharing scheme with dynamic size of shares for distributed storage system., , , , , and . Secur. Commun. Networks, 7 (8): 1245-1252 (2014)An adaptive immune-inspired multi-objective algorithm with multiple differential evolution strategies., , , , , , and . Inf. Sci., (2018)A Clustering-Based Evolutionary Algorithm for Many-Objective Optimization Problems., , , , , , and . IEEE Trans. Evol. Comput., 23 (3): 391-405 (2019)Integrate Depth Information to Enhance the Robustness of Object Level SLAM., and . CGI (3), volume 14497 of Lecture Notes in Computer Science, page 186-197. Springer, (2023)An Efficient Evaluation Mechanism for Evolutionary Reinforcement Learning., , , , , and . ICIC (1), volume 13393 of Lecture Notes in Computer Science, page 41-50. Springer, (2022)An End-to-End Structure with Novel Position Mechanism and Improved EMD for Stock Forecasting., and . ICONIP (11), volume 1965 of Communications in Computer and Information Science, page 526-537. Springer, (2023)Distributed Hot Spots Caching Mechanism for Queries with Popular Distribution., , and . ISCSCT (2), page 418-421. IEEE Computer Society, (2008)Virtualization security for cloud computing service., , , , and . CDC, page 174-179. IEEE Computer Society, (2011)Cloud Storage Integrity Checking: Going from Theory to Practice., , , and . SCC@AsiaCCS, page 24-28. ACM, (2016)