Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A DWT Blind Image Watermarking Strategy with Secret Sharing., , , and . PCM, volume 4810 of Lecture Notes in Computer Science, page 377-384. Springer, (2007)Multiparty quantum secret sharing with pure entangled states and decoy photons, , , , and . Physica A: Statistical Mechanics and its Applications, (Jul 15, 2007)MapReduce machine covering problem on a small number of machines., , and . J. Comb. Optim., 38 (4): 1066-1076 (2019)A bibliometric perspective on the roles of government funding and international collaboration in scientific research., , , and . ISSI, page 1537-1547. Edizioni Efesto, (2019)A comparative study on communication structures of Chinese journals in the social sciences., , and . J. Assoc. Inf. Sci. Technol., 61 (7): 1360-1376 (2010)Shedding light on the hidden human proteome expands immunopeptidome in cancer., , , , , , , and . Briefings Bioinform., (2022)Nonlinear Multiobjective MPC-Based Optimal Operation of a High Consistency Refining System in Papermaking., , , and . IEEE Trans. Syst. Man Cybern. Syst., 50 (3): 1208-1215 (2020)A Novel Analysis of CMAP Scans From Perspective of Information Theory: CMAP Distribution Index (CDIX)., , , , and . IEEE Trans. Biomed. Eng., 70 (4): 1182-1188 (April 2023)Neural network interpolation operators optimized by Lagrange polynomial., , and . Neural Networks, (2022)Knowledge Transfer for Out-of-Knowledge-Base Entities: Improving Graph-Neural-Network-Based Embedding Using Convolutional Layers., , , and . IEEE Access, (2020)