Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive flow abnormity identification based on information entropy., , and . Concurr. Comput. Pract. Exp., (2019)A trust-based cloud computing access control model., , , and . KES Journal, 20 (4): 197-203 (2016)Innovation and Development of Rural Leisure Tourism Industry Using Mobile Cloud IoT Computing.. Wirel. Commun. Mob. Comput., (2021)Joint fingerprinting and encryption in hybrid domains for multimedia sharing in social networks., , , , , and . J. Vis. Lang. Comput., 25 (6): 658-666 (2014)Secure social multimedia content distribution based on social network analysis., , , , , , and . Int. J. Reason. based Intell. Syst., 8 (1/2): 69-75 (2016)NetSecCC: A scalable and fault-tolerant architecture for cloud computing security., , , , and . Peer-to-Peer Netw. Appl., 9 (1): 67-81 (2016)OMS-J: An Opinion Mining System for Japanese Weblog Reviews Using a Combination of Supervised and Unsupervised Approaches., and . HLT-NAACL (Demonstrations), page 19-20. The Association for Computational Linguistics, (2007)Modifying SO-PMI for Japanese Weblog Opinion Mining by Using a Balancing Factor and Detecting Neutral Expressions., and . HLT-NAACL (Short Papers), page 189-192. The Association for Computational Linguistics, (2007)An Improved Voltage Control Strategy Based on Finite-Time Theory for Virtual Synchronous Generator., , , , , and . IECON, page 1-6. IEEE, (2021)PNSICC: A Novel Parallel Network Security Inspection Mechanism Based on Cloud Computing., , , , and . ICA3PP (4), volume 9531 of Lecture Notes in Computer Science, page 402-415. Springer, (2015)