Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cone-beam computed tomography study of root and canal morphology of mandibular premolars in a western Chinese population., , , , , , and . BMC Medical Imaging, (2012)基于深度信息的动态手势识别综述 (Review of Dynamic Gesture Recognition Based on Depth Information)., , , , and . 计算机科学, 45 (12): 42-51 (2018)Secure multi-owner-based cloud computing scheme for big data., , and . Int. J. Big Data Intell., 3 (3): 182-189 (2016)Theoretical approach to modelling and analysis of the bioprocess with product inhibition and impulse effect., , , and . Biosyst., 104 (2-3): 77-86 (2011)ADMIRE--Towards the High-Level DMI Model, Language and Ontology, , , , , , , , , and 1 other author(s). (2008)Efficient Processing of Spatial Group Preference Queries., , , , and . DASFAA (2), volume 11447 of Lecture Notes in Computer Science, page 642-659. Springer, (2019)Design of Rapid Image Mosaic Based on CUDA by 100-Megapixel Optical System., , , , , , and . CSAE, page 123:1-123:6. ACM, (2020)A fast and accurate GPU based method on simulating energy deposition for beam-target coupling with granular materials., , , , , , , , , and 1 other author(s). Comput. Phys. Commun., (2021)Hardware/Software Security Patches for Internet of Trillions of Things., , , and . CoRR, (2019)Adversarial Task-Specific Privacy Preservation under Attribute Attack., , , and . CoRR, (2019)