Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

iRice-MS: An integrated XGBoost model for detecting multitype post-translational modification sites in rice., , , , , , , , and . Briefings Bioinform., (2022)iBLP: An XGBoost-Based Predictor for Identifying Bioluminescent Proteins., , , , , , and . Comput. Math. Methods Medicine, (2021)A Bipartite Network and Resource Transfer-Based Approach to Infer lncRNA-Environmental Factor Associations., and . IEEE ACM Trans. Comput. Biol. Bioinform., 15 (3): 753-759 (2018)Homotherapy for heteropathy active components and mechanisms of Qiang-Huo-Sheng-Shi decoction for treatment of rheumatoid arthritis and osteoarthritis., , , , , , , , and . Comput. Biol. Chem., (2020)RSSI-based dynamic coalition formation for cooperative interference management in femtocell networks., , , and . IWCMC, page 1400-1405. IEEE, (2015)Interference Assessment on the Circuit Domain in GSM-R Networks by Grey Clustering and Analytic Hierarchy Process., , , , , and . ICITCS, volume 215 of Lecture Notes in Electrical Engineering, page 667-675. Springer, (2012)Separation of impulsive acoustical events., , and . ICASSP (2), page 733-736. IEEE, (2004)Several features for discrimination between vocal sounds and other environmental sounds., , and . EUSIPCO, page 2099-2102. IEEE, (2004)Transnational citation, technological diversity and small world in global nanotechnology patenting., and . Scientometrics, 93 (3): 609-633 (2012)A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace., , , , and . Secur. Commun. Networks, (2017)