Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps., , , and . MobiSys, page 89-103. ACM, (2015)An efficient hybrid multi-objective particle swarm optimization with a multi-objective dichotomy line search., , , , and . J. Comput. Appl. Math., (2015)The Research on Consolidated Financial Evaluation about Corporate Social Responsibility Based on Fuzzy-AHP., , and . HIS (3), page 447-450. IEEE Computer Society, (2009)Supervising and appraising of harmonious society development grade of china based on grey system theories., , and . SMC, page 2205-2209. IEEE, (2007)Scalable hardware-based power management for many-core systems., , and . ACSSC, page 1834-1838. IEEE, (2014)AHP and game theory based approach for network selection in heterogeneous wireless networks., , , and . CCNC, page 501-506. IEEE, (2014)Energy-Efficient Resource Allocation with QoS Support in Wireless Body Area Networks., , , and . GLOBECOM, page 1-6. IEEE, (2015)A Hybrid Deep Reinforcement Learning Algorithm for Intelligent Manipulation., , , , , and . ICIRA (4), volume 11743 of Lecture Notes in Computer Science, page 367-377. Springer, (2019)Analysis of tandem PIT and CS with non-zero download delay., , , , and . INFOCOM, page 1-9. IEEE, (2017)Optimizing information credibility in social swarming applications., , , , and . INFOCOM, page 556-560. IEEE, (2011)