Author of the publication

Optimal control of computer virus under a delayed model.

, , , and . Appl. Math. Comput., 218 (23): 11613-11619 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain-based access control scheme with incentive mechanism for eHealth systems: patient as supervisor., , , , and . Multim. Tools Appl., 80 (20): 30605-30621 (2021)A Malware Propagation Model Considering Conformity Psychology in Social Networks., , , and . Axioms, 11 (11): 632 (2022)What are the actual needs of visually impaired people?, , and . Displays, (July 2023)Applications of Distributed Ledger Technologies to the Internet of Things: A Survey., , , , and . ACM Comput. Surv., 52 (6): 120:1-120:34 (2020)Massive MIMO CSI reconstruction using CNN-LSTM and attention mechanism., , , and . IET Commun., 14 (18): 3089-3094 (2020)Enhancing microblog sentiment analysis through multi-level feature interaction fusion with social relationship guidance., , , , and . Appl. Intell., 54 (1): 443-459 (January 2024)A novel activation function based recurrent neural networks and their applications on sentiment classification and dynamic problems solving., and . Frontiers Neurorobotics, (September 2022)A Lightweight Key Agreement Protocol Based on Chinese Remainder Theorem and ECDH for Smart Homes., , and . Sensors, 20 (5): 1357 (2020)The combined impact of external computers and network topology on the spread of computer viruses., , , and . Int. J. Comput. Math., 91 (12): 2491-2506 (2014)DHF-Net: A hierarchical feature interactive fusion network for dialogue emotion recognition., , , , and . Expert Syst. Appl., (2022)