Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study of Students' Perceived Learning in a Web-based Online Environment., and . WebNet, page 575-580. AACE, (1999)Two Novel Measurements for the Drive-Mode Resonant Frequency of a Micromachined Vibratory Gyroscope., , , , , and . Sensors, 13 (11): 15770-15784 (2013)Effectiveness of Web-Based Learning Opportunities in a Competency-Based Program., , and . International Journal on E-Learning, 5 (3): p353 - 360 (20060701)DTI-MLCD: predicting drug-target interactions using multi-label learning with community detection method, , , , , , , , and . Briefings in Bioinformatics, (September 2020)bbaa205.An evolutionary classifier for steel surface defects with small sample set., , , , and . EURASIP J. Image Video Process., (2017)Efficient identity-based multi-bit proxy re-encryption over lattice in the standard model., , , and . J. Inf. Secur. Appl., (2019)Face-Based Authentication Using Computational Secure Sketch., , , and . IEEE Trans. Mob. Comput., 22 (12): 7172-7187 (December 2023)MDF-SA-DDI: predicting drug-drug interaction events based on multi-source drug fusion, multi-source feature fusion and transformer self-attention mechanism., , , , , , , , , and 1 other author(s). Briefings Bioinform., (2022)Lattice-based certificateless encryption scheme., , , , and . Frontiers Comput. Sci., 8 (5): 828-836 (2014)Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model., , , , and . Frontiers Comput. Sci., 8 (3): 469-477 (2014)