Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Application of RFID in Emergency Medicine., , , and . ICEB, page 1201-1206. Academic Publishers/World Publishing Corporation, (2004)A Spatial-Temporal-Semantic Neural Network Algorithm for Location Prediction on Moving Objects., , , , and . Algorithms, 10 (2): 37 (2017)Stochastic delay differential equation and its application on communications., , and . ISCAS, page 1364-1367. IEEE, (2010)Using RFID to guard inpatient medication safety., , and . BCBGC, page 111-117. ISRST, (2008)Low-Overhead and High-Precision Prediction Model for Content-Based Sensor Search in the Internet of Things., , , , and . IEEE Communications Letters, 20 (4): 720-723 (2016)Modeling Intra- and Inter-community Information for Route and Time Prediction in Last-mile Delivery., , , , , , and . ICDE, page 3106-3112. IEEE, (2023)Manipulating Black-Box Networks for Centrality Promotion., , , , , and . ICDE, page 73-84. IEEE, (2021)Mobile Internet Access Control Strategy Based on Trust Perception., , , , , , and . ICAIS (3), volume 13340 of Lecture Notes in Computer Science, page 598-611. Springer, (2022)DataLens: Scalable Privacy Preserving Training via Gradient Compression and Aggregation., , , , , and . CCS, page 2146-2168. ACM, (2021)Control-based Bidding for Mobile Livestreaming Ads with Exposure Guarantee., , , , , and . CIKM, page 2539-2548. ACM, (2022)