Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TSHC: Trusted Scheme for Hadoop Cluster., , , , and . EIDWT, page 344-349. IEEE Computer Society, (2013)A Generalized Predictive Control-Based Path Following Method for Parafoil Systems in Wind Environments., , , and . IEEE Access, (2019)Splitting Third-Party Libraries' Privileges from Android Apps., , , , and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 80-94. Springer, (2017)Balanced Multiwavelets Based Digital Image Watermarking., , , and . IWDW, volume 5450 of Lecture Notes in Computer Science, page 350-362. Springer, (2008)Environmental influences on microassembly., , , , and . IROS, page 1760-1765. IEEE, (2002)A Shapley value based method for allocating carbon obligation between generation side and demand side in power system., , , and . IECON, page 56-60. IEEE, (2017)Domain Adaptation for Semantic Segmentation with Conditional Random Field., , , and . Cognitive Internet of Things, volume 810 of Studies in Computational Intelligence, Springer, (2019)Optical Biopsy of Melanoma and Basal Cell Carcinoma Progression by Noncontact Photoacoustic and Optical Coherence Tomography: In Vivo Multi-Parametric Characterizing Tumor Microenvironment., , , and . IEEE Trans. Medical Imaging, 39 (6): 1967-1974 (2020)A Rational Threshold Signature Model and Protocol Based on Different Permissions., , and . J. Appl. Math., (2014)Privacy Protection Scheme for the Internet of Vehicles Based on Private Set Intersection., , , and . Cryptogr., 6 (4): 64 (2022)