Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

e-TSN: an interactive visual exploration platform for target-disease knowledge mapping from literature., , , and . Briefings Bioinform., (2022)A MADM Location Privacy Protection Method Based on Blockchain., , , , , and . IEEE Access, (2021)Enhancing Location Privacy through P2P Network and Caching in Anonymizer., , , and . KSII Trans. Internet Inf. Syst., 16 (5): 1653-1670 (2022)BiGRU-DP: Improved differential privacy protection method for trajectory data publishing., , , , , and . Expert Syst. Appl., (2024)Track Crack Detection Method in Complex Environment., , , , and . ISCID (1), page 356-359. IEEE, (2018)KPDR : An Effective Method of Privacy Protection., , , , , and . Complex., (2021)A Network Security Risk Assessment Method Based on a B_NAG Model., , , , , and . Comput. Syst. Sci. Eng., 38 (1): 103-117 (2021)Research on Security Architecture for Defending Insider Threat., , , and . IAS, page 30-33. IEEE Computer Society, (2009)Crack Detection of Track Plate Based on YOLO., , and . ISCID (2), page 15-18. IEEE, (2019)Multi-modal chemical information reconstruction from images and texts for exploring the near-drug space., , , , , , , , , and . Briefings Bioinform., (2022)