Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services., , and . SEC, volume 214 of IFIP Conference Proceedings, page 239-250. Kluwer, (2002)Secure M-commerce Transactions: A Third Party Based Signature Protocol., , , and . IAS, page 3-8. IEEE Computer Society, (2007)A Novel Hybrid Intelligence Algorithm for Solving Combinatorial Optimization Problems., , and . JCSE, 8 (4): 199-206 (2014)Discovering Spammers in Social Networks., , , , , and . AAAI, AAAI Press, (2012)Efficient graph-cut tattoo segmentation., , , and . Visual Information Processing and Communication, volume 9410 of SPIE Proceedings, page 94100H. SPIE, (2015)Dynamic wavelength assignment for realizing hypercube-based Bitonic sorting on wavelength division multiplexing linear arrays., , , and . Int. J. Comput. Math., 92 (2): 218-229 (2015)Fast Mode Decision for Coarse Grain SNR Scalable Video Coding., , and . ICASSP (2), page 545-548. IEEE, (2006)Joint resource allocation method in heterogeneous wireless networks based on genetic algorithm., , , and . WCSP, page 1-5. IEEE, (2012)Real-time Edge Repartitioning for Dynamic Graph., , and . CIKM, page 2125-2128. ACM, (2019)How to Find It Better?: Cross-Learning for WeChat Mini Programs., , , , and . CIKM, page 2753-2761. ACM, (2019)