Author of the publication

Security Analysis With Novel Image Masking Based Quantum-Dot Cellular Automata Information Security Model.

, , , , , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simple Motion Evasion Differential Game of Many Pursuers and Evaders with Integral Constraints., , , and . Dyn. Games Appl., 8 (2): 352-378 (2018)Evasion from Several Pursuers in the Game with Coordinate-wise Integral Constraints., , , , and . Dyn. Games Appl., 13 (3): 819-842 (September 2023)Equilibria of the Games in Choice Form., , and . J. Optimization Theory and Applications, 155 (3): 1060-1072 (2012)Linear evasion differential game of one evader and several pursuers with integral constraints., , , and . Int. J. Game Theory, 50 (3): 729-750 (2021)Multiobjective programming with new invexities., , and . Optim. Lett., 7 (5): 855-870 (2013)Hopf Bifurcation Analysis in a Modified R&D Model with Delay., , , and . Axioms, 11 (4): 148 (2022)Extracting knowledge patterns with a social network analysis approach: an alternative methodology for assessing the impact of power inventors., , and . Scientometrics, 113 (3): 1593-1625 (2017)Nonlinear dynamics in a Solow model with delay and non-convex technology., , and . Appl. Math. Comput., (2014)High-order moments conservation in thermostatted kinetic models., , and . J. Glob. Optim., 58 (2): 389-404 (2014)Differential game of optimal pursuit of one evader by many pursuers., and . Int. J. Game Theory, 48 (2): 481-490 (2019)