Author of the publication

A Data Placement Strategy for Big Data Based on DCC in Cloud Computing Systems.

, , , , and . SmartCity, page 623-630. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The APT Detection Method based on Attack Tree for SDN., and . ICCSP, page 116-121. ACM, (2018)Face presentation attack detection in mobile scenarios: A comprehensive evaluation., , , and . Image Vis. Comput., (2020)Adaptive sliding mode position control of electro-hydraulic servo system with single-rod actuators., , , and . ROSE, page 220-225. IEEE, (2013)Spoofing and Anti-Spoofing with Wax Figure Faces., , , and . CoRR, (2019)B-DP: Dynamic Collection and Publishing of Continuous Check-In Data with Best-Effort Differential Privacy., , , and . Entropy, 24 (3): 404 (2022)Text-Image De-Contextualization Detection Using Vision-Language Models., , , and . ICASSP, page 8967-8971. IEEE, (2022)Can ChatGPT Detect DeepFakes? A Study of Using Multimodal Large Language Models for Media Forensics., , , , , , , , , and . CoRR, (2024)Parameterized Design and Dynamic Analysis of a Reusable Launch Vehicle Landing System with Semi-Active Control., , , and . Symmetry, 12 (9): 1572 (2020)Coarse-to-Fine Copy-Move Forgery Detection for Video Forensics., , , , and . IEEE Access, (2018)Cluster-Indistinguishability: A practical differential privacy mechanism for trajectory clustering., , and . Intell. Data Anal., 21 (6): 1305-1326 (2017)