Author of the publication

A cooperative scheme for secure communications with partner selection and incentive mechanism.

, , , , , and . WCSP, page 1-6. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bayesian analysis of inspection sampling procedures discussed by Deming, and . Journal of Statistical Planning and Inference, (1987)System Reliability and Component Importance Under Dependence: A Copula Approach., and . Technometrics, 59 (2): 215-224 (2017)Application of Spark parallelization technology in architectural text classification., , , and . J. Comput. Methods Sci. Eng., 18 (4): 963-976 (2018)Deep convolutional network based image quality enhancement for low bit rate image compression., , , , and . VCIP, page 1-4. IEEE, (2016)Entropy of primitive: A top-down methodology for evaluating the perceptual visual information., , , , and . VCIP, page 1-6. IEEE, (2013)Towards accurate visual information estimation with Entropy of Primitive., , , , and . ISCAS, page 1046-1049. IEEE, (2015)Automated evaluation of building alignments in generalized maps., , , , and . Int. J. Geogr. Inf. Sci., 27 (8): 1550-1571 (2013)Low complexity encoder optimization for HEVC., , , , , , and . J. Vis. Commun. Image Represent., (2016)Visual Information Evaluation With Entropy of Primitive., , , , , , and . IEEE Access, (2018)Towards Making Unsupervised Graph Hashing Robust., , , , and . ICME, page 1-6. IEEE, (2020)