Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach of Digital Rights Management for E-Museum with Enforce Context Constraints in RBAC Environments., , , and . SMC, page 1871-1878. IEEE, (2006)Construction of the Enterprise-level RFID Security and Privacy Management Using Role-Based Key Management., , , and . SMC, page 3310-3317. IEEE, (2006)Feature enhancement modules applied to a feature pyramid network for object detection., , , , and . Pattern Anal. Appl., 26 (2): 617-629 (May 2023)ROLIG3A: Protecting Group Secret Key Generation Procedures against Malicious Attackers., , , , and . VTC Fall, page 1-5. IEEE, (2021)cHRV Uncovering Daily Stress Dynamics Using Bio-Signal from Consumer Wearables., , , , and . MedInfo, volume 245 of Studies in Health Technology and Informatics, page 98-102. IOS Press, (2017)WSMeter: A Performance Evaluation Methodology for Google's Production Warehouse-Scale Computers., , , , , and . ASPLOS, page 549-563. ACM, (2018)Application of Web Data Mining Based on the Neural Network Algorithms in E-Commerce.. ICEBE, page 509-512. IEEE Computer Society, (2010)Improving predictive models with clustered sequences: An Application on Heart Failure Risk Prediction., , , , and . CRI, AMIA, (2017)Signal Timing Optimization Model Based on Bus Priority., , , and . Inf., 11 (6): 325 (2020)A Deep Learning Method for Breast Cancer Classification in the Pathology Images., , , , , , , , and . IEEE J. Biomed. Health Informatics, 26 (10): 5025-5032 (2022)