Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Document Self-Destruction Scheme with Identity Based Encryption., , , , and . INCoS, page 239-243. IEEE, (2013)Channel estimation of sparse multipath based on compressed sensing using Golay sequences., , , and . DSP, page 976-980. IEEE, (2015)Dynamic Resource Allocation for Energy Efficient Transmission in Digital Subscriber Lines., , , , and . IEEE Trans. Signal Process., 65 (16): 4353-4366 (2017)Kurtosis Normalization in Feature Space for Robust Speaker Verification., , , and . ICASSP (1), page 117-120. IEEE, (2006)MAIM: A Novel Incentive Mechanism Based on Multi-Attribute User Selection in Mobile Crowdsensing., , , , , and . IEEE Access, (2018)ADME Properties Evaluation in Drug Discovery: Prediction of Caco-2 Cell Permeability Using a Combination of NSGA-II and Boosting., , , , , , , , and . J. Chem. Inf. Model., 56 (4): 763-773 (2016)Research on UAV Cooperative Task Assignment Based on Dynamic Multi-objective Evolutionary Algorithm., , , and . ICCT, page 492-497. IEEE, (2022)Service-based general power system data exchange mode., , , , and . ISGT Asia, page 1-6. IEEE, (2017)A Practical Model for Dynamic Software Measurement., , and . CSSE (2), page 578-581. IEEE Computer Society, (2008)978-0-7695-3336-0.High performance parallel evolutionary algorithm model based on MapReduce framework., , , , and . Int. J. Comput. Appl. Technol., 46 (3): 290-295 (2013)