Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Medium-Term Conflict Detection and Resolution Method for Open Low-Altitude City Airspace Based on Temporally and Spatially Integrated Strategies., , , and . IEEE Trans. Control. Syst. Technol., 28 (5): 1817-1830 (2020)A secure heuristic semantic searching scheme with blockchain-based verification., , , and . Inf. Process. Manag., 58 (4): 102548 (2021)Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring., , , , , , and . CoRR, (2022)Differentiable Bi-Sparse Multi-View Co-Clustering., , , , and . IEEE Trans. Signal Process., (2021)BDTF: A Blockchain-Based Data Trading Framework with Trusted Execution Environment., , , , , and . MSN, page 92-97. IEEE, (2020)Secure Federated Learning Model Verification: A Client-side Backdoor Triggered Watermarking Scheme., , , , , and . SMC, page 2414-2419. IEEE, (2021)The Bi-objective Active-Scan Agile Earth Observation Satellite Scheduling Problem: Modeling and Solution Approach., , , , and . CEC, page 1-6. IEEE, (2018)Sparse Matrix Feature Selection in Multi-label Learning., , and . RSFDGrC, volume 9437 of Lecture Notes in Computer Science, page 332-339. Springer, (2015)A Practical Website Fingerprinting Defense Approach with Universal Adversarial Perturbations., , , , and . ICCCS, page 752-760. IEEE, (2022)Hierarchical feature selection with multi-granularity clustering structure., , and . Inf. Sci., (2021)