Author of the publication

Data Access Control Method of Power Terminal Based on Trust and Reputation.

, , , , , and . ISCSIC, page 211-215. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Trust-Based Security Scheme for 5G UAV Communication Systems., , and . DASC/PiCom/CBDCom/CyberSciTech, page 371-374. IEEE, (2020)On Performance of Peer Review for Academic Journals: Analysis Based on Distributed Parallel System., , , and . IEEE Access, (2019)Video Shot Boundary Detection Using Independent Component Analysis., and . ICASSP (2), page 541-544. IEEE, (2005)A web-enabled video indexing system., and . Multimedia Information Retrieval, page 307-314. ACM, (2004)Providing an Uncertainty Reasoning Service for Semantic Web Application., , , , , and . APWeb, volume 3841 of Lecture Notes in Computer Science, page 628-639. Springer, (2006)A weighted range-free localization algorithm for irregular multihop networks., , , , , and . Int. J. Commun. Syst., (2022)Multiobjective Optimization of Lane-Changing Strategy for Intelligent Vehicles in Complex Driving Environments., , , , , and . IEEE Trans. Veh. Technol., 69 (2): 1291-1308 (2020)Fault diagnosis for rolling bearing based on parameter transfer Bayesian network., , and . Qual. Reliab. Eng. Int., 38 (8): 4291-4308 (2022)Algorithm and Hardware Design for High Volume Rate 3-D Medical Ultrasound Imaging.. Arizona State University, Tempe, USA, (2019)base-search.net (ftarizonastateun:item:55684).Off-line handwritten word recognition (HWR) using a single contextual hidden Markov model., , and . CVPR, page 669-672. IEEE, (1992)