Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Adaptive and Robust Method for Oriented Oversampling With Spatial Information for Imbalanced Noisy Datasets., and . IEEE Access, (2023)A formal model-based approach for developing an interoperable mobile agent system., , , , and . Multiagent Grid Syst., 2 (4): 401-412 (2006)FL-MGVN: Federated learning for anomaly detection using mixed gaussian variational self-encoding network., , and . Inf. Process. Manag., 59 (2): 102839 (2022)Multi-layer perceptron-based tectonic discrimination of basaltic rocks and an application on the Paleoproterozoic Xiong'er volcanic province in the North China Craton., , and . Comput. Geosci., (2021)Compositional time Petri nets and reduction rules., , and . IEEE Trans. Syst. Man Cybern. Part B, 30 (4): 562-572 (2000)KDM security for identity-based encryption: Constructions and separations., , , and . Inf. Sci., (2019)KDM Security for Identity-Based Encryption: Constructions and Separations., , , and . IACR Cryptol. ePrint Arch., (2016)Non-Malleable Functions and Their Applications., , , , and . IACR Cryptol. ePrint Arch., (2015)Causal Discovery for Climate Research Using Graphical Models, and . Journal of Climate, 25 (17): 5648 - 5665 (2012)(Identity-based) dual receiver encryption from lattice-based programmable hash functions with high min-entropy., , , and . Cybersecur., 2 (1): 18 (2019)