Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Optimization Framework for Mobile Data Collection in Energy-Harvesting Wireless Sensor Networks., , and . IEEE Trans. Mob. Comput., 15 (12): 2969-2986 (2016)Applied research on visual mining technology in medical data., , , , and . CCIS, page 229-233. IEEE, (2016)Mobility Assisted Data Gathering in heterogeneous energy replenishable wireless sensor networks., , and . ICCCN, page 1-8. IEEE, (2014)Deep feature weighting in Naive Bayes for Chinese text classification., , , , , and . CCIS, page 160-164. IEEE, (2016)Text summarization using Sentence-Level Semantic Graph Model., , , , and . CCIS, page 171-176. IEEE, (2016)A Mobile Data Gathering Framework for Wireless Rechargeable Sensor Networks with Vehicle Movement Costs and Capacity Constraints., , , and . IEEE Trans. Computers, 65 (8): 2411-2427 (2016)Errata to "Isosurface Extraction and View-Dependent Filtering from Time-Varying Fields Using Persistent Time-Octree (PTOT)"., and . IEEE Trans. Vis. Comput. Graph., 16 (2): 350-351 (2010)A web page malicious script detection system., , , , , and . CCIS, page 394-399. IEEE, (2014)An Efficient EAP-Based Pre-Authentication for Inter-WRAN Handover in TV White Space., , and . IEEE Access, (2017)Enhancing Attribute-based Encryption with Attribute Hierarchy., , , and . IACR Cryptology ePrint Archive, (2009)