Author of the publication

Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things.

, , , , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Storage Device Performance Prediction with Hybrid Regression Models., , , and . PDCAT, page 556-559. IEEE, (2012)A new approach to query segmentation for relevance ranking in web search., , , and . Inf. Retr. Journal, 18 (1): 26-50 (2015)Messages Ranking in Social Network., , and . Intelligent Information Processing, volume 385 of IFIP Advances in Information and Communication Technology, page 268-275. Springer, (2012)A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol., , and . APWeb, volume 3841 of Lecture Notes in Computer Science, page 806-811. Springer, (2006)Context-Aware Dual-Attention Network for Natural Language Inference., , , , , and . PAKDD (3), volume 11441 of Lecture Notes in Computer Science, page 185-198. Springer, (2019)Automatic Domain Ontology Generation from Web sites., , and . Transactions of the SDPS, 9 (3): 29-38 (2005)Efficient karaoke song recommendation via multiple kernel learning approximation., , , , , and . Neurocomputing, (2017)A semantic term weighting scheme for text categorization., , and . Expert Syst. Appl., 38 (10): 12708-12716 (2011)A Survey of Context-Aware Mobile Recommendations., , , and . Int. J. Inf. Technol. Decis. Mak., 12 (1): 139-172 (2013)A Novel Approach of Table Detection and Analysis for Semantic Annotation., , and . Int. J. Artif. Intell. Tools, 15 (3): 465-480 (2006)