Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A DNA sequence distance measure approach for phylogenetic tree construction., and . BIC-TA, page 204-212. IEEE, (2010)Validation indices for projective clustering., , and . Frontiers Comput. Sci. China, 3 (4): 477-484 (2009)Cache-based Optimization for Block Commit of Hyperledger Fabric., , , and . ICDM (Workshops), page 902-906. IEEE, (2020)Low latency Improved Weighted Hard-Decision LDPC Algorithm for 5G NR., , and . ICCCS, page 861-867. IEEE, (2021)An intelligent PE-malware detection system based on association mining., , , , and . J. Comput. Virol., 4 (4): 323-334 (2008)Reducing Spurious Correlations for Aspect-Based Sentiment Analysis with Variational Information Bottleneck and Contrastive Learning., , , and . CoRR, (2023)CIMDS: Adapting Postprocessing Techniques of Associative Classification for Malware Detection., , , and . IEEE Trans. Syst. Man Cybern. Part C, 40 (3): 298-307 (2010)A Supervised Learning Model for Detecting Ponzi Contracts in Ethereum Blockchain., , and . ICBDS, volume 1563 of Communications in Computer and Information Science, page 657-672. Springer, (2021)An Improved Initialization Method for Clustering High-Dimensional Data., and . DBTA, page 1-4. IEEE, (2010)Secure and Efficient Content Distribution in Crowdsourced Vehicular Content-Centric Networking., , , , , and . IEEE Access, (2018)