Author of the publication

A Security Technology for Mobile Agent System Improved by Trusted Computing Platform.

, and . HIS (3), page 46-50. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Strategy Dynamic Evolution-Based Improved MOEA/D Algorithm for Solving Multi-Objective Fuzzy Flexible Job Shop Scheduling Problem., , , , and . IEEE Access, (2023)Mapping Object-Oriented Database Models Into RDF(S).. IEEE Access, (2018)Mining Quantitative Association Rules on Overlapped Intervals., , and . ADMA, volume 3584 of Lecture Notes in Computer Science, page 43-50. Springer, (2005)Malware Clustering Using Family Dependency Graph., , , and . IEEE Access, (2019)Non-negative Matrix Factorization Based Learning from Label Proportions for Vehicle Loan Default Detection., , and . ITQM, volume 162 of Procedia Computer Science, page 878-886. Elsevier, (2019)Effective Anchor Adaptation and Feature Enhancement Strategies for Tiny Object Detection in Aerial Images., , , and . IEEE Access, (2024)Frequency compensated diffusion model for real-scene dehazing., , , , and . Neural Networks, (2024)MA2-FPN for Tiny Object Detection from Remote Sensing Images., , , , and . CISP-BMEI, page 1-8. IEEE, (2022)Walking Telescope: Exploring the Zooming Effect in Expanding Detection Threshold Range for Translation Gain., , , , and . CVM (1), volume 14592 of Lecture Notes in Computer Science, page 252-273. Springer, (2024)A Security Technology for Mobile Agent System Improved by Trusted Computing Platform., and . HIS (3), page 46-50. IEEE Computer Society, (2009)