Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps., , , and . MobiSys, page 89-103. ACM, (2015)The Research on Consolidated Financial Evaluation about Corporate Social Responsibility Based on Fuzzy-AHP., , and . HIS (3), page 447-450. IEEE Computer Society, (2009)A Fast Independent Component Analysis Algorithm for Geochemical Anomaly Detection and Its Application to Soil Geochemistry Data Processing., , , and . J. Appl. Math., (2014)The list coloring and list total coloring of planar graphs with maximum degree at least 7., , , and . Discuss. Math. Graph Theory, 40 (4): 1005-1024 (2020)Trajectory optimization and resource allocation for UAV-assisted relaying communications., , and . Wirel. Networks, 26 (1): 739-749 (2020)Core Decomposition, Maintenance and Applications., , and . Complexity and Approximation, volume 12000 of Lecture Notes in Computer Science, page 205-218. Springer, (2020)Nonfragile passivity and passification of nonlinear singular networked control systems with randomly occurring controller gain fluctuation., and . Complex., 21 (S1): 200-210 (2016)Cache-Based Scalable Deep Packet Inspection with Predictive Automaton., , , , and . GLOBECOM, page 1-5. IEEE, (2010)Compact DFA Structure for Multiple Regular Expressions Matching., , , , and . ICC, page 1-5. IEEE, (2009)Bayesian analysis for dependent competing risks model with masked causes of failure in step-stress accelerated life test under progressive hybrid censoring., , and . Commun. Stat. Simul. Comput., 49 (9): 2302-2320 (2020)