Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Hair Segmentation in Complex Background., , and . ROBIO, page 2496-2501. IEEE, (2019)Pairing-Free for Public Key Encryption With Equality Test Scheme., , , and . IEEE Access, (2021)eRAID: Conserving Energy in Conventional Disk-Based RAID System., , and . IEEE Trans. Computers, 57 (3): 359-374 (2008)A Security Control Model Based on Petri Net for Industrial IoT., , , , , and . ICII, page 156-159. IEEE, (2019)Dynamic Attack and Defense Security Situation Assessment Model for Power Information Physical Fusion System., , , , , and . ICII, page 152-155. IEEE, (2019)Compressed sensing based visually secure multi-secret image encryption-sharing scheme., , , , , and . Multim. Tools Appl., 83 (7): 18919-18941 (2024)PHISS: Progressive and hierarchical image segmentation-sharing scheme., , , , and . Digit. Signal Process., (2022)Shifted declustering: a placement-ideal layout scheme for multi-way replication storage architecture., , and . ICS, page 134-144. ACM, (2008)A Security Evaluation Model Based on Fuzzy Hierarchy Analysis for Industrial Cyber-Physical Control Systems., , , , and . ICII, page 62-65. IEEE, (2019)A New Placement-Ideal Layout for Multiway Replication Storage System., , , and . IEEE Trans. Computers, 60 (8): 1142-1156 (2011)