Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attribute Normalization Approaches to Group Decision-making and Application to Software Reliability Assessment.. Cogn. Comput., 13 (1): 139-163 (2021)Exploring the Privacy Concerns of Bystanders in Smart Homes from the Perspectives of Both Owners and Bystanders., , , and . Proc. Priv. Enhancing Technol., 2022 (3): 99-119 (2022)Mining least privilege attribute based access control policies., and . ACSAC, page 404-416. ACM, (2019)带有区间信息的软件质量评价模型 (Evaluation Model of Software Quality with Interval Data)., and . 计算机科学, 46 (10): 209-214 (2019)Secure Passwords Through Enhanced Hashing., , and . LISA, page 93-106. USENIX Association, (2009)A Tale of Two Communities: Privacy of Third Party App Users in Crowdsourcing - The Case of Receipt Transcription., , and . Proc. ACM Hum. Comput. Interact., 7 (CSCW2): 1-43 (2023)Anomaly Detection and Attack Classification for Train Real-Time Ethernet., , , , and . IEEE Access, (2021)An intuitionistic fuzzy projection-based approach and application to software quality evaluation.. Soft Comput., 24 (1): 429-443 (2020)Runtime and Programming Support for Memory Adaptation in Scientific Applications via Local Disk and Remote Memory., , , and . J. Grid Comput., 5 (2): 213-234 (2007)No Time Limit and Time Limit Model of Multiple Round Dutch Auction Based on Genetic Network Programming., , , and . J. Adv. Comput. Intell. Intell. Informatics, 15 (1): 3-12 (2011)