Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Active Optimization Method for Power Loss Distribution in T-Type Three-Level Converter Under Half-Wave Symmetry SHEPWM., and . IEEE Trans. Ind. Electron., 70 (10): 9731-9740 (October 2023)Prediction of Soil Nutrient Contents Using Visible and Near-Infrared Reflectance Spectroscopy., , , , , and . ISPRS Int. J. Geo Inf., 8 (10): 437 (2019)Estimation of Soil Heavy Metal Content Using Hyperspectral Data., , , , , and . Remote. Sens., 11 (12): 1464 (2019)Reducing the Service Function Chain Backup Cost Over the Edge and Cloud by a Self-Adapting Scheme., , , and . IEEE Trans. Mob. Comput., 21 (8): 2994-3008 (2022)Provably Secure Searchable Attribute-Based Authenticated Encryption Scheme., and . Int. J. Netw. Secur., 21 (2): 177-190 (2019)Directly Revocable and Verifiable Key-Policy Attribute-based Encryption for Large Universe., , and . Int. J. Netw. Secur., 19 (2): 272-284 (2017)Integration of Results From Convolutional Neural Network in a Support Vector Machine for the Detection of Atrial Fibrillation., , , , , and . IEEE Trans. Instrum. Meas., (2021)Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems., , , , and . IEEE Access, (2019)Special Issue on the Work-in-Progress (WIP) session at the ACM SIGMETRICS 2018 Conference., and . SIGMETRICS Perform. Evaluation Rev., 46 (2): 76 (2018)Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption., , , and . KSII Trans. Internet Inf. Syst., 15 (1): 323-342 (2021)