Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resource allocation based on quantum particle swarm optimization and RBF neural network for overlay cognitive OFDM System., , , , , and . Neurocomputing, (2016)A delay-based dynamic scheduling algorithm for bag-of-task workflows with stochastic task execution times in clouds., , , and . Future Gener. Comput. Syst., (2017)Low-cohesion differential privacy protection for industrial Internet., , , , , , and . J. Supercomput., 76 (11): 8450-8472 (2020)基于文化基因算法和最小二乘支持向量机的安全数据特征处理方法 (Feature Processing Approach Based on MA-LSSVM in Safety Data)., , , , and . 计算机科学, 44 (3): 237-241 (2017)A privacy-preserving recommendation method with clustering and locality-sensitive hashing., , , , and . Comput. Intell., 39 (1): 121-144 (February 2023)An Active Defense Model in Edge Computing Based on Network Topology Mimetic Correlation., , , , and . MobiCASE, volume 290 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 198-212. Springer, (2019)Self-similarity Analysis and Application of Network Traffic., , and . MobiCASE, volume 290 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 112-125. Springer, (2019)Label Aggregation with Clustering for Biased Crowdsourced Labeling., , , and . ICMLC, page 165-169. ACM, (2022)A defensive design for control application based on networked systems., , , , and . Soft Comput., 27 (1): 547-558 (2023)An accident prediction approach based on XGBoost., , , , and . ISKE, page 1-7. IEEE, (2017)