Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Convolution Neural Networks for Twitter Sentiment Analysis., , and . IEEE Access, (2018)Comparison Research on Text Pre-processing Methods on Twitter Sentiment Analysis., and . IEEE Access, (2017)Security Analysis for Hilbert Curve Based Spatial Data Privacy-Preserving Method., , , , and . HPCC/EUC, page 929-934. IEEE, (2013)The Localized Area Coverage algorithm Based on Game-Theory for WSN., and . J. Networks, 4 (10): 1001-1008 (2009)Exploring Convolution Neural Network for Branch Prediction., , , and . IEEE Access, (2020)Data-Driven and Feedback-Enhanced Trust Computing Pattern for Large-Scale Multi-Cloud Collaborative Services., , , and . IEEE Trans. Serv. Comput., 11 (4): 671-684 (2018)Research on an Algorithm of Shape Motion Deblurring., , , , and . ICIC (1), volume 9225 of Lecture Notes in Computer Science, page 327-338. Springer, (2015)A Secure and Targeted Mobile Coupon Delivery Scheme Using Blockchain., , , , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 538-548. Springer, (2018)Improved Bayesian Network Structure Learning with Node Ordering via K2 Algorithm., , , , and . ICIC (2), volume 8589 of Lecture Notes in Computer Science, page 44-55. Springer, (2014)A Framework for Measuring Query Privacy in Location-based Service., , and . KSII Trans. Internet Inf. Syst., 9 (5): 1717-1732 (2015)