Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cone-beam computed tomography study of root and canal morphology of mandibular premolars in a western Chinese population., , , , , , and . BMC Medical Imaging, (2012)基于深度信息的动态手势识别综述 (Review of Dynamic Gesture Recognition Based on Depth Information)., , , , and . 计算机科学, 45 (12): 42-51 (2018)A Secure Privacy-Preserving Data Aggregation Scheme Based on Bilinear ElGamal Cryptosystem for Remote Health Monitoring Systems., , , and . IEEE Access, (2017)Hardware/Software Security Patches for Internet of Trillions of Things., , , and . CoRR, (2019)Adversarial Task-Specific Privacy Preservation under Attribute Attack., , , and . CoRR, (2019)Secure multi-owner-based cloud computing scheme for big data., , and . Int. J. Big Data Intell., 3 (3): 182-189 (2016)An Improved Web Cache Replacement Algorithm Based on Weighting and Cost., , , , and . IEEE Access, (2018)An Exploratory Study of Functionality and Learning Resources of Web APIs on ProgrammableWeb., , and . EASE, page 202-207. ACM, (2017)The Influence of Different Personality Traits on Learning Achievement in Three Learning Situations., , , and . ICBL, volume 10309 of Lecture Notes in Computer Science, page 475-488. Springer, (2017)UnLocIn: Unauthorized location inference on smartphones without being caught., , , , , , , and . PRISMS, page 1-8. IEEE, (2013)