Author of the publication

A dynamic rule extraction based on information granularity model for complete data.

, , and . GrC, page 329-333. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SVM Based MLP Neural Network Algorithm and Application in Intrusion Detection., and . AICI (3), volume 7004 of Lecture Notes in Computer Science, page 340-345. Springer, (2011)User stateless privacy-preserving TPA auditing scheme for cloud storage., , , , and . J. Netw. Comput. Appl., (2019)Injury analysis of vehicle-pedestrian collision based on orthogonal experiments., , , and . Comput. Syst. Sci. Eng., (2020)Unidirectional p-GaN gate HEMT with composite source-drain field plates., , , , , , , , , and 1 other author(s). Sci. China Inf. Sci., (2022)Privacy-preserving TPA Auditing Scheme Based on Skip List for Cloud Storage., , and . Int. J. Netw. Secur., 21 (3): 451-461 (2019)Multi-strategy Ontology Mapping Based on Stacking Method., , , and . FSKD (2), page 262-269. IEEE Computer Society, (2009)An Identity-Based Authentication Model for Mobile Agent., , , and . IAS, page 475-478. IEEE Computer Society, (2009)Application of Clustering and Multi-cluster Selection in SoftMan's Perception System., , and . ICNC (2), page 134-138. IEEE Computer Society, (2007)A Survey on the Integrity Checking of Outsourced Data in Cloud Computing., and . UIC/ATC/ScalCom, page 1650-1656. IEEE Computer Society, (2015)Feature subset selection approach based on fuzzy rough set for high-dimensional data., and . GrC, page 72-75. IEEE Computer Society, (2014)