Author of the publication

Composite Structure Health Monitoring Review Based on FBG Sensor.

, , and . ICCCS (5), volume 11067 of Lecture Notes in Computer Science, page 171-179. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Congestion Prediction for Urban Areas by Spatiotemporal Data Mining., and . CyberC, page 290-297. IEEE, (2017)The Keyword Extraction of Chinese Medical Web Page Based on WF-TF-IDF Algorithm., , and . CyberC, page 193-198. IEEE, (2017)Coexistence of ferroelectric vortex domains and charged domain walls in epitaxial BiFeO3 film on (110) O GdScO3 substrate, , , , , , , , and . Journal of Applied Physics, 111 (10): 104117 (2012)Strategy Transformation Through Cultural Tradition Innovation - A Case Study of Fenjiu Group of China Time-honored Brand., , , , and . IEEM, page 1775-1779. IEEE, (2018)Cultural Information Resources Sharing: a review and empirical study in China.. Electron. Libr., 30 (6): 857-870 (2012)Exploration of Mechanical Principle Combined Curriculum Reform Based on Network Assisted Platform., , and . eLEOT, volume 299 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 170-176. Springer, (2019)POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity., , , , , and . ACM Conference on Computer and Communications Security, page 1684-1686. ACM, (2015)A Secure Automobile Information Sharing System., , and . IoTPTS@AsiaCCS, page 19-26. ACM, (2015)A Generic yet Efficient Method for Secure Inner Product., , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 217-232. Springer, (2017)Privacy-Preserving Naive Bayes Classification Using Fully Homomorphic Encryption., , , , , and . ICONIP (4), volume 11304 of Lecture Notes in Computer Science, page 349-358. Springer, (2018)