Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Security of A Remote Cloud Storage Integrity Checking Protocol., , , and . CoRR, (2019)Dynamic graph convolutional recurrent imputation network for spatiotemporal traffic missing data., , , , , and . Knowl. Based Syst., (2023)A New Mutual Authentication Protocol in Mobile RFID for Smart Campus., , , , , , and . IEEE Access, (2018)Purpose-based access policy on provenance and data algebra., , , and . CoRR, (2019)A parsimonious tree-grow method for haplotype inference., , , and . Bioinform., 21 (17): 3475-3481 (2005)A Higher-Order Motif-Based Spatiotemporal Graph Imputation Approach for Transportation Networks., , , , and . Wirel. Commun. Mob. Comput., (2022)Short-Term Failure Warning for Transmission Tower Under Land Subsidence Condition., , , , , and . IEEE Access, (2020)Traffic Flow Imputation Based on Multi-Perspective Spatiotemporal Generative Adversarial Networks., , , , and . CECNet, volume 363 of Frontiers in Artificial Intelligence and Applications, page 62-73. IOS Press, (2022)Design of Broadband Micro-power Protocol Analysis System., , , and . ICCT, page 404-409. IEEE, (2019)PACLP: a fine-grained partition-based access control policy language for provenance., , , and . CoRR, (2019)