Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Component Oriented Modelling and Design of Fuzzy Control Scheme for a Class of Pneumatic Actuators., , and . J. Intell. Fuzzy Syst., 5 (3): 229-243 (1997)Delegatable Order-Revealing Encryption., , and . AsiaCCS, page 134-147. ACM, (2019)Integrating Gaussian Process with Reinforcement Learning for Adaptive Service Composition., , , and . ICSOC, volume 9435 of Lecture Notes in Computer Science, page 203-217. Springer, (2015)Integrating Trust with User Preference for Effective Web Service Composition., , , , and . IEEE Trans. Serv. Comput., 10 (4): 574-588 (2017)Identity-based authenticated encryption with identity confidentiality., , and . Theor. Comput. Sci., (2022)Integrating Reinforcement Learning with Multi-Agent Techniques for Adaptive Service Composition., , , , , , and . ACM Trans. Auton. Adapt. Syst., 12 (2): 8:1-8:42 (2017)Identity-Based Higncryption., and . IACR Cryptology ePrint Archive, (2019)Integrating recurrent neural networks and reinforcement learning for dynamic service composition., , , , , and . Future Gener. Comput. Syst., (2020)A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption., , and . Secur. Commun. Networks, 7 (1): 14-32 (2014)Online reliability time series prediction via convolutional neural network and long short term memory for service-oriented systems., , , , and . Knowl. Based Syst., (2018)