Author of the publication

Research on Fault Detection Technology of Information System Based on Trusted Computing.

, , , and . ICCT, page 1301-1305. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The modularity equation with Mayor's aggregation operators and semi-t-operators., , and . Fuzzy Sets Syst., (2021)Experimental test of Tsirelson's bound with a single photonic qubit., , , , and . Sci. China Inf. Sci., 63 (8): 1-3 (2020)The modularity equation for semi-t-operators and T-uninorms., and . Int. J. Approx. Reason., (2022)Methods for obtaining uni-nullnorms and null-uninorms on bounded lattices., , and . Fuzzy Sets Syst., (2022)The effects of TIS and MI on the texture features in ultrasonic fatty liver images., , and . Medical Imaging: Computer-Aided Diagnosis, volume 10134 of SPIE Proceedings, page 101343K. SPIE, (2017)Comparative research on operation models of reverse logistics., and . IEEM, page 504-508. IEEE, (2015)Exploiting the Floating-Point Computing Power of GPUs for RSA., , , , and . ISC, volume 8783 of Lecture Notes in Computer Science, page 198-215. Springer, (2014)Statistical Properties of the Congestion Process of Particle Delivering on scale-free network., , and . ICNC, page 3648-3651. IEEE, (2010)Coexistence Downlink Interference Analysis Between LEO System and GEO System in Ka Band., , , , , and . ICCC, page 465-469. IEEE, (2018)Convex Optimal Power Flow Based on Second-Order Cone Programming: Models, Algorithms and Applications.. Royal Institute of Technology, Stockholm, Sweden, (2018)base-search.net (ftkthstockholm:oai:DiVA.org:kth-227044).