Author of the publication

Conflicting Information Fusion Based on an Improved DS Combination Method.

, , , and . Symmetry, 9 (11): 278 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Exploratory Study of Functionality and Learning Resources of Web APIs on ProgrammableWeb., , and . EASE, page 202-207. ACM, (2017)A purpose-based privacy-aware system using privacy data graph., , and . MoMM, page 412-416. ACM, (2009)The Influence of Different Personality Traits on Learning Achievement in Three Learning Situations., , , and . ICBL, volume 10309 of Lecture Notes in Computer Science, page 475-488. Springer, (2017)Hardware/Software Security Patches for Internet of Trillions of Things., , , and . CoRR, (2019)Secure multi-owner-based cloud computing scheme for big data., , and . Int. J. Big Data Intell., 3 (3): 182-189 (2016)Using a coordination degree model to evaluate intensive urban land utilization., , , , , and . Geoinformatics, page 1-5. IEEE, (2010)A framework for distributed metadata management of mineral information resources with access control., , , and . Geoinformatics, page 1-4. IEEE, (2013)UnLocIn: Unauthorized location inference on smartphones without being caught., , , , , , , and . PRISMS, page 1-8. IEEE, (2013)A novel rumor detection algorithm based on entity recognition, sentence reconfiguration, and ordinary differential equation network., , , and . Neurocomputing, (2021)Using Sonar for Liveness Detection to Protect Smart Speakers against Remote Attackers., , , , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 4 (1): 16:1-16:28 (2020)