Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Public Data Integrity Verification Scheme for Secure Cloud Storage., , , and . Inf., 11 (9): 409 (2020)Unsupervised feature selection by non-convex regularized self-representation., , , , , and . Expert Syst. Appl., (2021)A study of pricing strategy for Mobile Internet service using clickstream data., , and . ISKE, page 283-286. IEEE, (2010)Design and Implementation of Scalable Admission Control., , , and . QoS-IP, volume 1989 of Lecture Notes in Computer Science, page 1-16. Springer, (2001)A New Perspective of Support Vector Clustering with Boundary Patterns., , , and . MCS, volume 7872 of Lecture Notes in Computer Science, page 224-235. Springer, (2013)Deep-sea image stitching: Using multi-channel fusion and improved AKAZE., , and . IET Image Process., 17 (14): 4061-4075 (2023)Extenics based Innovation of New Professional Farmer Cultivation under the Strategy of Rural Vitalization., , and . ITQM, volume 162 of Procedia Computer Science, page 131-138. Elsevier, (2019)A Multiple-Landmark Multicast Protocol Based on Location Information in Ad Hoc Networks., , and . ICNC (6), page 501-504. IEEE Computer Society, (2009)PEPFL: A framework for a practical and efficient privacy-preserving federated learning., , , , , and . Digit. Commun. Networks, 10 (2): 355-368 (2024)A threshold hybrid encryption method for integrity audit without trusted center., , , , , and . J. Cloud Comput., 10 (1): 3 (2021)