Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel image encryption algorithm based on SPWLCM and DNA coding., and . Math. Comput. Simul., (2021)SUMMA: subgraph matching in massive graphs., , and . CIKM, page 1285-1288. ACM, (2010)PipAttack: Poisoning Federated Recommender Systems for Manipulating Item Promotion., , , , , and . WSDM, page 1415-1423. ACM, (2022)Stability analysis of XCP congestion control systems., and . WCNC, page 1980-1985. IEEE, (2009)Deep Key Frame Extraction for Sport Training., , , , and . CCCV (3), volume 773 of Communications in Computer and Information Science, page 607-616. Springer, (2017)A Novel Segmentation-Based Video Denoising Method with Noise Level Estimation., , , , and . MMM (1), volume 7732 of Lecture Notes in Computer Science, page 272-282. Springer, (2013)Smart Contract-based Miner Registration and Block Validation., and . AsiaCCS, page 691-693. ACM, (2019)SuReQL: A subgraph match based relational model for large graphs., , and . ICDE Workshops, page 212-215. IEEE Computer Society, (2013)A Non-Cooperative Satellite Feature Point Selection Method for Vision-Based Navigation System., , and . Sensors, 18 (3): 854 (2018)AK-SYS-IE: A novel adaptive Kriging-based method for system reliability assessment combining information entropy., , , , and . Reliab. Eng. Syst. Saf., (2024)