Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust PCA Using Matrix Factorization for Background/Foreground Separation., , , , , and . IEEE Access, (2018)An efficient privacy-preserving data query and dissemination scheme in vehicular cloud., , , , , and . Pervasive Mob. Comput., (2020)A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies., , , , , , and . Entropy, 23 (5): 529 (2021)Matrix Factorization for User Behavior Analysis of Location-Based Social Network., , and . WISE Workshops, volume 8182 of Lecture Notes in Computer Science, page 84-97. Springer, (2013)Day-Ahead Optimization and New Energy Integration Capacity Assessment of Integrated Energy Systems., , , , , , and . iSPEC, page 1-7. IEEE, (2023)AI 2000: A Decade of Artificial Intelligence., , , , , , and . WebSci, page 345-354. ACM, (2020)A New Non-interior Continuation Method for Second-Order Cone Programming., , , and . CSO (2), page 719-722. IEEE Computer Society, (2009)978-0-7695-3605-7.The Data Quality Evaluation that Under the Background of Wisdom City., and . IScIDE (2), volume 9243 of Lecture Notes in Computer Science, page 612-621. Springer, (2015)A decomposition method for large-scale box constrained optimization., , , and . Appl. Math. Comput., (2014)Measuring the uncertainty of RFID data based on particle filter and particle swarm optimization., and . Wirel. Networks, 18 (3): 307-318 (2012)