Author of the publication

Access Control Model Based on Role and Attribute and Its Implementation.

, , , , , and . CyberC, page 66-71. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Analysis and Evaluation for Active Antenna Arrays Under Three-Dimensional Wireless Channel Model., , , , , and . IEEE Access, (2018)Correlation Filter Tracking with Adaptive Proposal Selection for Accurate Scale Estimation., , , and . ICME, page 1816-1821. IEEE, (2019)Combining Deep Neural Networks and Classical Time Series Regression Models for Forecasting Patient Flows in Hong Kong., , , , , , , and . IEEE Access, (2019)Regression and classification using extreme learning machine based on L1-norm and L2-norm., , and . Neurocomputing, (2016)Access Control Model Based on Role and Attribute and Its Implementation., , , , , and . CyberC, page 66-71. IEEE, (2016)Timeliness online regularized extreme learning machine., , , and . Int. J. Machine Learning & Cybernetics, 9 (3): 465-476 (2018)Fixed-time synchronization of fractional order memristive MAM neural networks by sliding mode control., , , , , , and . Neurocomputing, (2020)A Parallel Recommender System Using a Collaborative Filtering Algorithm with Correntropy for Social Networks., , , , , , , and . IEEE Trans. Network Science and Engineering, 7 (1): 91-103 (2020)The Impact of Block Parameters on the Throughput and Security of Blockchains., , , and . ICBCT, page 13-18. ACM, (2020)On Threat Analysis of IoT-Based Systems: A Survey., , and . SmartIoT, page 205-212. IEEE, (2020)