Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stain Detection in Video with Background Restructured., , and . J. Multim., 9 (7): 963-969 (2014)Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations., , , and . IEEE Trans. Parallel Distributed Syst., 24 (6): 1172-1181 (2013)Locating Prefix Hijackers using LOCK., , , , , and . USENIX Security Symposium, page 135-150. USENIX Association, (2009)Analysis of Illumination Conditions in the Lunar South Polar Region Using Multi-Temporal High-Resolution Orbital Images., , , , , , , , and . Remote. Sens., 15 (24): 5691 (December 2023)Dissecting Performances of PERSIANN-CDR Precipitation Product over Huai River Basin, China., , , , , , , , , and . Remote. Sens., 11 (15): 1805 (2019)Extracting Citrus in Southern China (Guangxi Region) Based on the Improved DeepLabV3+ Network., , , , , , , , , and . Remote. Sens., 15 (23): 5614 (December 2023)Characterizing and Optimizing Cellular Network Performance During Crowded Events., , , , , and . IEEE/ACM Trans. Netw., 24 (3): 1308-1321 (2016)Optimal channel choices and online refund policies in a low-carbon tourism supply chain considering carbon reduction level., , , and . INFOR Inf. Syst. Oper. Res., 61 (1): 34-66 (January 2023)Solving the reconstruction-generation trade-off: Generative model with implicit embedding learning., , , and . Neurocomputing, (September 2023)Securely outsourcing power grid simulation on cloud., and . ACM Great Lakes Symposium on VLSI, page 225-226. ACM, (2014)