Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-Smooth Control of PMSM Position Servo System Based on Model Compensation., , , , and . IECON, page 601-606. IEEE, (2018)Cloud-based radio frequency identification authentication protocol with location privacy protection., , , and . IJDSN, (2018)Differentially Private Data Releasing for Smooth Queries., , , , , , and . J. Mach. Learn. Res., (2016)Learning a generative classifier from label proportions., , , , , and . Neurocomputing, (2014)An Ensemble Learning Approach to Detect Malwares Based on Static Information., , , , , , and . ICA3PP (3), volume 12454 of Lecture Notes in Computer Science, page 676-686. Springer, (2020)Option pricing model calibration using a real-valued quantum-inspired evolutionary algorithm., , , and . GECCO, page 1983-1990. ACM, (2007)Calibration of the VGSSDOption Pricing Model using a Quantum-inspired Evolutionary Algorithm., , , , and . Quantum Inspired Intelligent Systems, volume 121 of Studies in Computational Intelligence, Springer, (2008)A new proxy blind signature scheme., , and . Int. J. Grid Util. Comput., 3 (1): 38-42 (2012)RSEL: revocable secure efficient lightweight RFID authentication scheme., , , , , and . Concurr. Comput. Pract. Exp., 26 (5): 1084-1096 (2014)Efficient ID-based registration protocol featured with user anonymity in mobile IP networks., , , , , , and . IEEE Trans. Wirel. Commun., 9 (2): 594-604 (2010)