Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ensuring data storage security in Cloud Computing., , , and . IWQoS, page 1-9. IEEE, (2009)Rapid Recognition of Dynamical Patterns via Deterministic Learning and State Observation., , and . ISIC, page 35-40. IEEE, (2007)Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming., , and . IEEE Trans. Computers, 65 (1): 216-229 (2016)Monocular visual SLAM for small UAVs in GPS-denied environments., , , , , and . ROBIO, page 896-901. IEEE, (2012)Stochastic mobile energy replenishment and adaptive sensor activation for perpetual wireless rechargeable sensor networks., , and . WCNC, page 974-979. IEEE, (2013)Analysis of Risk Factors for Cervical Cancer Based on Machine Learning Methods., , and . CCIS, page 631-635. IEEE, (2018)Unsupervised Leraning for Sematic Representation of Short Text., , and . CCIS, page 475-478. IEEE, (2018)A Hybrid Data Collection Scheme for Wireless Sensor Networks Using Compressed Sensing., , , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 619-626. IEEE, (2018)Privacy-Preserving Ridesharing Recommendation in Geosocial Networks., , and . CSoNet, volume 9795 of Lecture Notes in Computer Science, page 193-205. Springer, (2016)Kernel Semi-supervised Extreme Learning Machine Applied in Urban Traffic Congestion Evaluation., , , and . CDVE, volume 9929 of Lecture Notes in Computer Science, page 90-97. (2016)