Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Game-Theoretic Approach to Solving the Roman Domination Problem., , , and . CoRR, (2023)Affine-Constrained Group Sparse Coding Based on Mixed Norm., , , , , and . ICONIP (6), volume 10639 of Lecture Notes in Computer Science, page 471-480. Springer, (2017)Asymmetric Game: A Silver Bullet to Weighted Vertex Cover of Networks., , and . IEEE Trans. Cybern., 48 (10): 2994-3005 (2018)When Reputation Enforces Evolutionary Cooperation in Unreliable MANETs., , and . IEEE Trans. Cybern., 45 (10): 2190-2201 (2015)Optimize Grouping and Path of Pylon Inspection in Power System., , , , , , and . IEEE Access, (2020)Extending Local passivity Theory and Hopf bifurcation at the Edge of Chaos in Oregonator CNN., , , and . Int. J. Bifurc. Chaos, (2012)CUPID: consistent unlabeled probability of identical distribution for image classification., , , , , , , and . Knowl. Based Syst., (2017)A Bayesian Game Based Vehicle-to-Vehicle Electricity Trading Scheme for Blockchain-Enabled Internet of Vehicles., , , , , and . IEEE Trans. Veh. Technol., 69 (7): 6856-6868 (2020)A Proof-of-Weighted-Planned-Behavior Consensus for Efficient and Reliable Cyber-Physical Systems., , , , , , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 113-125. Springer, (2022)BIA: A Blockchain-based Identity Authorization Mechanism., , , , , and . MSN, page 98-105. IEEE, (2020)