Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using NMFAS to identify key biological pathways associated with human diseases., , , , and . ISB, page 79-85. IEEE, (2012)A Quantitative Risk Evaluation Model for Network Security Based on Body Temperature., , , and . J. Comput. Networks Commun., (2016)Preliminary Study on Shape Sensing for Continuum Robot Affected by External Load Using Piecewise Fitting Curves., , and . ROBIO, page 2414-2420. IEEE, (2019)Data User-Based Attribute Based Encryption., , , and . CISS, page 1-5. IEEE, (2020)Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions., , , , , , and . IACR Cryptol. ePrint Arch., (2020)Correspondence estimation for non-rigid point clouds with automatic part discovery., , and . Vis. Comput., 32 (12): 1511-1524 (2016)An Improved Differential Evolution Algorithm for a Multicommodity Location-Inventory Problem with False Failure Returns., , , , and . Complex., (2018)B^2SFL: A Bi-level Blockchained Architecture for Secure Federated Learning-based Traffic Prediction., , , , and . CoRR, (2023)A generalized regionalization framework for geographical modelling and its application in spatial regression., , and . CoRR, (2022)Improving the Accuracy of Land Cover Mapping by Distributing Training Samples., , , , , , , , and . Remote. Sens., 13 (22): 4594 (2021)