Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A web page malicious script detection system., , , , , and . CCIS, page 394-399. IEEE, (2014)Applied research on visual mining technology in medical data., , , , and . CCIS, page 229-233. IEEE, (2016)Enabling Public Verifiability and Data Dynamics for Storage Security., , , , and . IACR Cryptology ePrint Archive, (2009)An Optimization Framework for Mobile Data Collection in Energy-Harvesting Wireless Sensor Networks., , and . IEEE Trans. Mob. Comput., 15 (12): 2969-2986 (2016)Mobility Assisted Data Gathering in heterogeneous energy replenishable wireless sensor networks., , and . ICCCN, page 1-8. IEEE, (2014)Deep feature weighting in Naive Bayes for Chinese text classification., , , , , and . CCIS, page 160-164. IEEE, (2016)Text summarization using Sentence-Level Semantic Graph Model., , , , and . CCIS, page 171-176. IEEE, (2016)A Mobile Data Gathering Framework for Wireless Rechargeable Sensor Networks with Vehicle Movement Costs and Capacity Constraints., , , and . IEEE Trans. Computers, 65 (8): 2411-2427 (2016)Enhanced two-step spectrum sensing algorithm for OFDM signal., , and . CCECE, page 375-378. IEEE, (2011)Pose estimation in industrial machine vision systems under sensing dynamics: A statistical learning approach., , and . ICRA, page 4436-4442. IEEE, (2014)