Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intervention Effect of Mindfulness Based Cognitive Therapy on College Students Dependent on Online Games in the Internet Era., and . DPTA, volume 1088 of Advances in Intelligent Systems and Computing, page 1613-1619. Springer, (2019)Health Monitoring of Bolt Looseness in Timber Structures Using PZT-Enabled Time-Reversal Method., , , and . J. Sensors, (2019)Efficient image encryption and compression based on a VAE generative model., , and . J. Real-Time Image Processing, 16 (3): 765-773 (2019)Colorimetric Sensors for Chemical and Biological Sensing Applications., , , , and . Sensors, 23 (5): 2749 (March 2023)Efficient Multiparty Probabilistic Threshold Private Set Intersection., , and . CCS, page 2188-2201. ACM, (2023)Ant Colony optimization for Electric Vehicle Routing Problem with Capacity and Charging Time Constraints., , , , and . SMC, page 480-485. IEEE, (2022)Research on the Teaching of Music Education in Colleges and Universities Under the Reflective Teaching Dimension., , , , , and . ICIEI, page 77-83. ACM, (2022)Rational Multi-Secret Sharing Scheme in Standard Point-to-Point Communication Networks., and . Int. J. Found. Comput. Sci., 24 (6): 879-898 (2013)Verifiable Rational Secret Sharing Scheme in Mobile Networks., , and . Mob. Inf. Syst., (2015)Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation., , , , and . Secur. Commun. Networks, (2019)