Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spatial-temporal analysis on bird habitat discovery in China., , , , , and . SPAC, page 573-578. IEEE, (2017)A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method., , , , and . Mob. Networks Appl., 24 (4): 1317-1335 (2019)Tolerance-Based Group Scoring Scheme Promotes Cooperation in Public Goods Game., , , , and . DASC/PiCom/DataCom/CyberSciTech, page 432-436. IEEE Computer Society, (2016)Fiden: Intelligent Fingerprint Learning for Attacker Identification in the Industrial Internet of Things., , , and . IEEE Trans. Ind. Informatics, 17 (2): 882-890 (2021)Multiple parameter control for ant colony optimization applied to feature selection problem., , , , , , and . Neural Comput. Appl., 26 (7): 1693-1708 (2015)Blockchain-Based Secure Computation Offloading in Vehicular Networks., , , , , and . IEEE Trans. Intell. Transp. Syst., 22 (7): 4073-4087 (2021)Correction to: A lossless secret image sharing scheme using a larger finite field., , , , and . Multim. Tools Appl., 81 (21): 31199 (2022)Rigorous or tolerant: The effect of different reputation attitudes in complex networks., , , , , and . Future Gener. Comput. Syst., (2018)Text Data Truth Discovery Using Self-confidence of Sources., , , , , , and . IWCMC, page 131-136. IEEE, (2020)A lossless secret image sharing scheme using a larger finite field., , , , and . Multim. Tools Appl., 80 (19): 28731-28743 (2021)