Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters., , , , , and . ICITS, volume 10015 of Lecture Notes in Computer Science, page 3-23. (2016)Clustering of high-dimensional gene expression data with feature filtering methods and diffusion maps., , , and . Artif. Intell. Medicine, 48 (2-3): 91-98 (2010)Travelling waves and global attractivity of an SIRS disease model with spatial diffusion and temporary immunity., and . Appl. Math. Comput., (2013)A Cascade Sequence-to-Sequence Model for Chinese Mandarin Lip Reading., , and . MMAsia, page 32:1-32:6. ACM, (2019)Study of Dynamic Group Evolution for Health Prediction of Mangrove Ecosystem., , , , , and . IIAI-AAI, page 79-84. IEEE, (2019)Bipartite Toughness and k-Factors in Bipartite Graphs., , , and . Int. J. Math. Mathematical Sciences, (2008)Adaptive synchronisation of memristor-based neural networks with leakage delays and applications in chaotic masking secure communication., and . Int. J. Systems Science, 49 (6): 1300-1315 (2018)Global Robust Exponential Stability of Uncertain Neutral High-Order Stochastic Hopfield Neural Networks with Time-Varying Delays., and . Neural Processing Letters, 32 (1): 83-96 (2010)Multistability and Multiperiodicity for a Class of Cohen-Grossberg BAM Neural Networks with Discontinuous Activation Functions and Time Delays., and . Neural Processing Letters, 42 (2): 417-435 (2015)An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency., , , , and . IACR Cryptology ePrint Archive, (2014)