Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CCUBI: A cross-chain based premium competition scheme with privacy preservation for usage-based insurance., , , , , , , and . Int. J. Intell. Syst., 37 (12): 11522-11546 (December 2022)DeFiScanner: Spotting DeFi Attacks Exploiting Logic Vulnerabilities on Blockchain., , , , , , and . IEEE Trans. Comput. Soc. Syst., 11 (2): 1577-1588 (April 2024)FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks., , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)VGA Display Driver design Based on FPGA., , , and . ICIS, page 530-535. IEEE, (2019)Stepper motor SPWM subdivision control circuit design based on FPGA., , , and . ICIS, page 889-893. IEEE Computer Society, (2017)A deep learning model for the accurate prediction of the microstructure performance of hot rolled steel., , and . Int. J. Manuf. Res., 16 (3): 262-279 (2021)Three-Dimensional SVM with Latent Variable: Application for Detection of Lung Lesions in CT Images., , and . J. Medical Systems, 39 (1): 171 (2015)Dual role model for question recommendation in community question answering., , and . SIGIR, page 771-780. ACM, (2012)Range-based Obstructed Nearest Neighbor Queries., , , and . SIGMOD Conference, page 2053-2068. ACM, (2016)Building Detection from VHR Remote Sensing Imagery Based on the Morphological Building Index., , , , , , and . Remote Sensing, 10 (8): 1287 (2018)