From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The process of resource bricolage and organizational improvisation in information technology innovation: a case study of BDZX in China., , , , , и . Inf. Technol. Dev., 28 (2): 275-296 (2022)OHEA: Secure Data Aggregation in Wireless Sensor Networks against Untrusted Sensors., и . CIKM, стр. 1425-1434. ACM, (2020)CVAS: An Interactive Visual Analytics System for Exploring COVID-19 Information on the Web., , , и . ICCDA, стр. 116-121. ACM, (2022)Unified abstract syntax tree representation learning for cross-language program classification., , , и . ICPC, стр. 390-400. ACM, (2022)You Can Walk Alone: Trajectory Privacy-Preserving through Significant Stays Protection., , , и . DASFAA (1), том 7238 из Lecture Notes in Computer Science, стр. 351-366. Springer, (2012)Corrupted and occluded face recognition via cooperative sparse representation., , , и . Pattern Recognit., (2016)Authenticating Top-k Queries in Location-based Services with Confidentiality., , и . Proc. VLDB Endow., 7 (1): 49-60 (2013)Regional urban extent extraction using multi-sensor data and decision rules., , и . IGARSS, стр. 1778-1781. IEEE, (2016)Towards Real-time Parallel Processing of Spatial Queries., , и . ICPP, стр. 565-572. IEEE Computer Society, (2003)Security Analysis of Random Phase Encoding Based Image Encryption in Gyrator Transform Domains., , , , и . CIS, стр. 579-582. IEEE Computer Society, (2013)