Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

All-Against-All Circular Pattern Matching., and . Comput. J., 55 (7): 897-906 (2012)Research on OCR Post-processing Applications for Handwritten Recognition Based on Analysis of Scientific Materials., , and . CSISE (1), volume 104 of Advances in Intelligent and Soft Computing, page 131-135. Springer, (2011)Availability Analysis Method of Multilevel Security Models with Credibility Characteristics, , , and . Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on, 1, page 175-178. (April 2009)Acceleration of Naive-Bayes algorithm on multicore processor for massive text classification., , , , , , , and . ISIC, page 344-347. IEEE, (2014)A novel non-convex low-rank tensor approximation model for hyperspectral image restoration., , , , , and . Appl. Math. Comput., (2021)A Tensor Subspace Representation-Based Method for Hyperspectral Image Denoising., , , , and . IEEE Trans. Geosci. Remote. Sens., 59 (9): 7739-7757 (2021)A Novel Lyapunov based Dynamic Resource Allocation for UAVs-assisted Edge Computing., , , , and . Comput. Networks, (2022)A novel Latency-Guaranteed based Resource Double Auction for market-oriented edge computing., , , , and . Comput. Networks, (2021)A verifiable and privacy-preserving framework for federated recommendation system., , , , , and . J. Ambient Intell. Humaniz. Comput., 14 (4): 4273-4287 (2023)Cloud Storage for Electronic Health Records Based on Secret Sharing With Verifiable Reconstruction Outsourcing., , , , , and . IEEE Access, (2018)