Author of the publication

An Information Intelligent Search Method for Computer Forensics Based on Text Similarity.

, , , , and . ICCSP, page 79-83. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep multi-sphere support vector data description based on disentangled representation learning., , and . Pattern Recognit., (2024)Energy-Efficient Secure Short-Packet Transmission in NOMA-Assisted mMTC Networks With Relaying., , , , and . IEEE Trans. Veh. Technol., 71 (2): 1699-1712 (2022)Neural Network-Based Relay Selection in Two-Way SWIPT-Enabled Cognitive Radio Networks., , , and . IEEE Trans. Veh. Technol., 69 (6): 6264-6274 (2020)Secure Computation Offloading for Device-Collaborative MEC Networks: A DRL-Based Approach., , , , , and . IEEE Trans. Veh. Technol., 72 (4): 4887-4903 (April 2023)Vector Perturbation Precoding Under Imperfect CSI and Inaccurate Power Scaling Factors., , , , and . IEEE Access, (2019)Stereoscopic video saliency detection based on spatiotemporal correlation and depth confidence optimization., , , , , and . Neurocomputing, (2020)A Generic Strategy for Fault-Tolerance in Control Systems Distributed Over a Network., , , , , and . Eur. J. Control, 13 (2-3): 280-296 (2007)The Geodetic Number of an Oriented Graph., and . Eur. J. Comb., 21 (2): 181-189 (2000)Overview and comparison of approaches towards an algebraic description of discrete event systems., , and . Annu. Rev. Control., (2019)A Robust Covert Attack Strategy for a Class of Uncertain Cyber-Physical Systems., , and . IEEE Trans. Autom. Control., 69 (3): 1983-1990 (March 2024)