Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficiently Supporting Structure Queries on Phylogenetic Trees., , and . SSDBM, page 93-102. (2005)Semi-Supervised Learning Based on Generative Adversarial Network and Its Applied to Lithology Recognition., , , , and . IEEE Access, (2019)An Improved Over-sampling Algorithm based on iForest and SMOTE., , and . ICSCA, page 75-80. ACM, (2019)Reservoir Parameter Prediction Using Optimized Seismic Attributes Based on Gamma Test., , and . ICSCA, page 403-407. ACM, (2019)Crimson: A Data Management System to Support Evaluating Phylogenetic Tree Reconstruction Algorithms., , , , , and . VLDB, page 1231-1234. ACM, (2006)RRXF: Redundancy reducing XML storage in relations., , , and . VLDB, page 189-200. Morgan Kaufmann, (2003)Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks., , , , , , and . CoRR, (2020)PPTA: A location privacy-preserving and flexible task assignment service for spatial crowdsourcing., , , , , , and . Comput. Networks, (April 2023)Towards Encrypted In-Network Storage Services with Secure Near-Duplicate Detection., , , and . IEEE Trans. Serv. Comput., 14 (4): 998-1012 (2021)Towards Secure and Accurate Targeted Mobile Coupon Delivery., , , , , , and . IEEE Access, (2016)