Author of the publication

Improved Digital Password Authentication Method for Android System.

, , , and . ICIC (2), volume 10955 of Lecture Notes in Computer Science, page 780-791. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Query sampling for ranking learning in web search., , , and . SIGIR, page 754-755. ACM, (2009)A Decentralized Copyright Protection Method Supporting Validity Period Control., , , and . CONF-CDS, page 46:1-46:9. ACM, (2021)Gender effect on discrimination of location and frequency in surface electrical stimulation., , , , , , and . EMBC, page 2071-2074. IEEE, (2015)A Study of Language Model for Image Retrieval., , and . ICDM Workshops, page 158-163. IEEE Computer Society, (2009)Multiagent Consensus Control Strategy considering Whole-Process Thermodynamic Characteristics of Air Conditioning Process., , , , , , and . J. Electr. Comput. Eng., (2021)Collaborative learning for image and video annotation., , , and . Multimedia Information Retrieval, page 443-450. ACM, (2008)Two-Stage Charging Strategy for Plug-In Electric Vehicles at the Residential Transformer Level., , and . IEEE Trans. Smart Grid, 4 (3): 1442-1452 (2013)Comparison of Bayesian and regression models in missing enzyme identification., , , and . Int. J. Bioinform. Res. Appl., 4 (4): 363-374 (2008)Difficulty guided image retrieval using linear multiview embedding., , , , , and . ACM Multimedia, page 1169-1172. ACM, (2011)Approximate Poisson disk sampling on mesh., , , and . Sci. China Inf. Sci., 56 (9): 1-12 (2013)