Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Delegatable Order-Revealing Encryption., , and . AsiaCCS, page 134-147. ACM, (2019)A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption., , and . Secur. Commun. Networks, 7 (1): 14-32 (2014)Integrating recurrent neural networks and reinforcement learning for dynamic service composition., , , , , and . Future Gener. Comput. Syst., (2020)Adaptive and large-scale service composition based on deep reinforcement learning., , , , , , , , and . Knowl. Based Syst., (2019)Online reliability time series prediction via convolutional neural network and long short term memory for service-oriented systems., , , , and . Knowl. Based Syst., (2018)Integrating Gaussian Process with Reinforcement Learning for Adaptive Service Composition., , , and . ICSOC, volume 9435 of Lecture Notes in Computer Science, page 203-217. Springer, (2015)Integrating Trust with User Preference for Effective Web Service Composition., , , , and . IEEE Trans. Serv. Comput., 10 (4): 574-588 (2017)Component Oriented Modelling and Design of Fuzzy Control Scheme for a Class of Pneumatic Actuators., , and . J. Intell. Fuzzy Syst., 5 (3): 229-243 (1997)Identity-Based Higncryption., and . IACR Cryptology ePrint Archive, (2019)Identity-based authenticated encryption with identity confidentiality., , and . Theor. Comput. Sci., (2022)