Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Outsourced data tagging via authority and delegable auditing for cloud storage., , , and . ICCST, page 131-134. IEEE, (2015)Emergency vehicle route oriented signal coordinated control model with two-level programming., , , and . Soft Comput., 22 (13): 4283-4294 (2018)An Improved Trust Model Based on Time Effect., , , and . CSA/CUTE, volume 474 of Lecture Notes in Electrical Engineering, page 376-381. Springer, (2017)A Particle Swarm Optimization and Mutation Operator Based Node Deployment Strategy for WSNs., , , , and . ICCCS (1), volume 10602 of Lecture Notes in Computer Science, page 430-437. Springer, (2017)Multiresolution neural networks for omnifont character recognition., and . ICNN, page 1588-1593. IEEE, (1993)DeepList: Learning Deep Features With Adaptive Listwise Constraint for Person Reidentification., , , , and . IEEE Trans. Circuits Syst. Video Techn., 27 (3): 513-524 (2017)Column Generation Accelerated Algorithm and Optimisation for a High-Speed Railway Train Timetabling Problem., , and . Symmetry, 11 (8): 983 (2019)SNKC: An Efficient On-the-Fly Pollution Detection Scheme for Content Distribution with Network Coding., , , and . HPCC/EUC, page 2298-2305. IEEE, (2013)Optimal local data exchange in fiber-wireless access network: A joint network coding and device association design., , , and . INFOCOM, page 1-9. IEEE, (2016)Untraceability of mobile devices in wireless mesh networks using linear network coding., , , and . INFOCOM, page 270-274. IEEE, (2013)