Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Social Recommendation Method Fusing User's Social Status and Homophily Based on Matrix Factorization Techniques., , , , , , , and . IEEE Access, (2019)Energy-Aware Download Method in LTE Based Smartphone., , , , and . IEICE Trans. Inf. Syst., 100-D (2): 304-312 (2017)A Semantic-Based Dual Location Privacy-Preserving Approach., , , , , , and . IEICE Trans. Inf. Syst., 105-D (5): 982-995 (2022)Deep Neural Network Based Chinese Dialect Classification., , , , , and . CBD, page 207-212. IEEE, (2021)Joint Energy Management and Interference Coordination With Max-Min Fairness in Ultra-Dense HetNets., , , , , , and . IEEE Access, (2018)Low load DIDS task scheduling based on Q-learning in edge computing environment., , , , and . J. Netw. Comput. Appl., (2021)ATO-EDGE: Adaptive Task Offloading for Deep Learning in Resource-Constrained Edge Computing Systems., , , , , , and . ICPADS, page 153-160. IEEE, (2021)Adaptive Bitrate Encoding Strategy for ROI-based Mobile Augmented Reality., , , , , , and . CBD, page 321-326. IEEE, (2021)An Intrusion Detection Model Based on Deep Belief Networks., , , and . CBD, page 247-252. IEEE Computer Society, (2014)A preference elicitation method based on bipartite graphical correlation and implicit trust., , , and . Neurocomputing, (2017)