Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Subspace segmentation via self-regularized latent K-means., , , , , and . Expert Syst. Appl., (2019)Green technology adoption in textiles and apparel supply chains with environmental taxes., , , and . Int. J. Prod. Res., 59 (14): 4157-4174 (2021)Online information platform for the management of national variety test of major crops in China: Design, development, and applications., , , , , , , , , and . Comput. Electron. Agric., (2022)Security evaluation on type-1 and type-1-like 4-branch generalized Feistel structures and application to reduced-round Lesamnta-LW-BC., , , , and . IET Inf. Secur., 16 (5): 390-400 (2022)LightFGCNet: A Lightweight and Focusing on Global Context Information Semantic Segmentation Network for Remote Sensing Imagery., , , , , , , , , and . Remote. Sens., 14 (24): 6193 (December 2022)A heterogeneous two-stream network for human action recognition., , and . AI Commun., 36 (3): 219-233 (2023)Probabilistic SVM classifier ensemble selection based on GMDH-type neural network., , , , , , , and . Pattern Recognit., (2020)A joint-norm distance metric 2DPCA for robust dimensionality reduction., , , and . Inf. Sci., (September 2023)A Novel Double Ensemble Algorithm for the Classification of Multi-Class Imbalanced Hyperspectral Data., , , , , and . Remote. Sens., 14 (15): 3765 (2022)The spatio-temporal modeling for criminal incidents., and . Secur. Informatics, 1 (1): 2 (2012)