Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A collaborative trust model of firewall-through based on Cloud Computing., , , , and . CSCWD, page 329-334. IEEE, (2010)Cross-layer iterative decoding of irregular LDPC codes using cyclic redundancy check codes., , , , and . WCNC, page 942-947. IEEE, (2009)Design and Implementation of Energy Saving Monitoring and Management System on Campus Based on Internet of Things Technology., , , and . HCC, volume 11956 of Lecture Notes in Computer Science, page 413-418. Springer, (2019)SVC Method for Textile Weave Recognizing., , , and . J. Convergence Inf. Technol., 5 (3): 16-19 (2010)Iterative Learning Fault Estimation Design for Nonlinear System with Random Trial Length., , , , and . Complex., (2017)A Variable Granularity User Classification Algorithm Based on Multi-dimensional Features of Users., , , , and . WISA, page 43-48. IEEE Computer Society, (2012)Intelligent Agents in Intrusion Detection of CSCW Systems., , and . CSCWD, page 1001-1004. IEEE, (2006)Sequential Condition Evolved Interaction Knowledge Graph for Traditional Chinese Medicine Recommendation., , , , , and . CoRR, (2023)A novel kind of sufficient conditions for safety judgement based on control barrier function., , and . Sci. China Inf. Sci., (2021)An Online Trend Analysis Method for Measuring Data Based on Historical Data Clustering., , , , , , and . ICSI (2), volume 7929 of Lecture Notes in Computer Science, page 137-145. Springer, (2013)