Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EDA: an enhanced dual-active algorithm for location privacy preservation inmobile P2P networks., , , , and . Journal of Zhejiang University - Science C, 14 (5): 356-373 (2013)Rare Category Detection Forest., , , and . KSEM, volume 9403 of Lecture Notes in Computer Science, page 612-618. Springer, (2015)Rare category exploration., , , , and . Expert Syst. Appl., 41 (9): 4197-4210 (2014)Evaluation of local community metrics: from an experimental perspective., , , and . J. Intell. Inf. Syst., 51 (1): 1-22 (2018)Discovery of Regional Co-location Patterns with k-Nearest Neighbor Graph., , , , and . PAKDD (1), volume 7818 of Lecture Notes in Computer Science, page 174-186. Springer, (2013)EduCoin: a Secure and Efficient Payment Solution for MOOC Environment., , , , , , and . Blockchain, page 490-495. IEEE, (2019)Joint affinity aware grouping and virtual machine placement., , , , , , and . Microprocess. Microsystems, (2017)HHMO: A Hot-page Based Hybrid-copy Migration Optimization Method., , , , and . Ad Hoc Sens. Wirel. Networks, 38 (1-4): 263-291 (2017)Cluster Analysis and Fuzzy Query in Ship Maintenance and Design., , , , and . ICIC (2), volume 5755 of Lecture Notes in Computer Science, page 458-467. Springer, (2009)Design and Implementation of a J2EE-Based Platform for Network Teaching., , and . ICWL, volume 3583 of Lecture Notes in Computer Science, page 49-55. Springer, (2005)