Author of the publication

Blockchain transaction model based on malicious node detection network.

, and . Multim. Tools Appl., 83 (14): 41293-41310 (April 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A principle-empirical model based on Bayesian network for quality improvement in mechanical products development., , and . Comput. Ind. Eng., (2020)Flexible Closed-Loop Iterative Learning Control for Industrial Batch Processes with State Delay and Time-Varying Uncertainties.. ROCOND, page 225-230. International Federation of Automatic Control, (2012)The overview of TD-HSUPA technology and network., and . FSKD, page 2258-2260. IEEE, (2012)Salient object detection based on discriminative boundary and multiple cues integration., , , , , and . J. Electronic Imaging, 25 (1): 013019 (2016)Image semantic segmentation with a novel stochastic model., and . CCIS, page 405-409. IEEE, (2014)The Effectiveness Study of Local Maximum Feature for Chinese Unknown Word Identification., , , and . Journal of Chinese Language and Computing, 17 (1): 15-26 (2007)Synchronization of complex dynamical networks with switching topology: A switched system point of view., , and . Autom., 45 (11): 2502-2511 (2009)基于群组运动模式变化分析的群体骚乱行为检测 (Detection for Group Riot Activity Based on Change Analysis of Group Motion Pattern)., , , and . 计算机科学, 45 (9): 314-319 (2018)FT-NIR and Confocal Microscope Raman Spectroscopic Studies of Sesame Oil Adulteration., , and . CCTA (2), volume 369 of IFIP Advances in Information and Communication Technology, page 24-31. Springer, (2011)Saliency Inspired Full-Reference Quality Metrics for Packet-Loss-Impaired Video., , , and . TBC, 57 (1): 81-88 (2011)