Author of the publication

Optimal Flow Allocation and Linear Network Coding Design for Multiple Multicasts under the Requirements of Information Theoretical Security.

, , , , and . Trustcom/BigDataSE/ISPA, page 576-583. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Semantic Role Labeling for Chinese Based on Semantic Chunking., and . ICCPOL, volume 5459 of Lecture Notes in Computer Science, page 79-90. Springer, (2009)Optimal Flow Allocation and Linear Network Coding Design for Multiple Multicasts under the Requirements of Information Theoretical Security., , , , and . Trustcom/BigDataSE/ISPA, page 576-583. IEEE, (2016)Optimal Cache Management and Routing for Secure Content Delivery in Information-Centric Networks with Network Coding., , , , , and . ISPA/IUCC, page 267-274. IEEE, (2017)Improving Chinese Semantic Role Classification with Hierarchical Feature Selection Strategy., and . EMNLP, page 324-333. ACL, (2008)On the optimal flow allocation and information theoretically secure network coding design for multiple multicasts., , , , , and . Int. J. Commun. Syst., (2018)Prediction and Analysis of Multiple Causes of Mental Health Problems Based on Machine Learning., , , , , , and . iConference (3), volume 14598 of Lecture Notes in Computer Science, page 150-160. Springer, (2024)Semantic Segmentation of Remote Sensing Architectural Images Based on GAN and UNet3+ Model., , and . PRICAI (1), volume 14325 of Lecture Notes in Computer Science, page 262-273. Springer, (2022)Semi-Proximal ADMM for Primal and Dual Robust Low-Rank Matrix Restoration from Corrupted Observations., , , and . Symmetry, 16 (3): 303 (March 2024)