Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain-Enabled Parallel Learning in Industrial Edge-Cloud Network: a Fuzzy DPoSt-PBFT Approach., , , , , and . GLOBECOM (Workshops), page 1-6. IEEE, (2021)Stability and performance of the stochastic fault tolerant control systems., , and . CDC, page 2484-2489. IEEE, (2003)Consensusability of discrete-time linear multi-agent systems with multiple inputs., , and . Neurocomputing, (2020)Globally optimal distributed cooperative control for general linear multi-agent systems., , , and . Neurocomputing, (2016)The future of Artificial Intelligence in Cybersecurity: A Comprehensive Survey., , and . EAI Endorsed Trans. Creative Technol., 8 (28): e3 (2021)Reviving the economy while saving lives: a deep reinforcement learning approach for smart POI reopening., , , , and . SIGSPATIAL/GIS, page 58:1-58:12. ACM, (2022)A memory capacity model for high performing data-filtering applications in Samza framework., , , and . IEEE BigData, page 2600-2605. IEEE Computer Society, (2015)Towards Mask-robust Face Recognition., , , , , and . ICCVW, page 1492-1496. IEEE, (2021)Direct Batch Growth Hierarchical Self-Organizing Mapping Based on Statistics for Efficient Network Intrusion Detection., , , , , , , , and . IEEE Access, (2020)Multiuser access control searchable privacy-preserving scheme in cloud storage., , , , , , and . Int. J. Commun. Syst., (2018)