Author of the publication

Updating the Discovered High Average-Utility Patterns with Transaction Insertion.

, , , , and . ICGEC, volume 579 of Advances in Intelligent Systems and Computing, page 66-73. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices., , and . COMPSAC (2), page 700-710. IEEE Computer Society, (2007)978-0-7695-2870-0.A pairing-based publicly verifiable secret sharing scheme., and . J. Systems Science & Complexity, 24 (1): 186-194 (2011)Efficient certificate-based aggregate signature scheme for vehicular ad hoc networks., , , , , , and . IET Networks, 9 (6): 290-297 (2020)A New Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol., , , and . J. Inf. Hiding Multim. Signal Process., 9 (6): 1595-1602 (2018)Construct Left Ventricular Hypertrophy Prediction Model Based on Random Forest., , , and . IIH-MSP (1), volume 109 of Smart Innovation, Systems and Technologies, page 142-150. Springer, (2018)Comments on a privacy preserving public auditing mechanism for shared cloud data., , , , , and . MISNC, page 48:1-48:6. ACM, (2017)Video salient region detection model based on wavelet transform and feature comparison., , and . EURASIP J. Image Video Process., (2019)Cryptanalysis of an Anonymous Mutual Authentication Scheme for Secure Inter-device Communication in Mobile Networks., , , and . IIH-MSP (1), volume 81 of Smart Innovation, Systems and Technologies, page 206-213. Springer, (2017)Data Filtering Method for the Optimization of Mobile Positioning Based on Deep Learning., , , and . ICCE-TW, page 1-2. IEEE, (2020)Security Analysis and Improvement of Femtocell Access Control., , , and . NSS, volume 8792 of Lecture Notes in Computer Science, page 223-232. Springer, (2014)