Author of the publication

区块链技术应用的安全与监管问题 (Security Incidents and Solutions of Blockchain Technology Application).

, , , , and . 计算机科学, 45 (6A): 352-355 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid fault diagnosis capability analysis of hypercubes under the PMC model and MM⁎ model., , , and . Theor. Comput. Sci., (2019)Edge detection in potential fields with the normalized total horizontal derivative., and . Comput. Geosci., (2012)Audio Watermarking Robust against Playback Speed Modification., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (12): 2889-2893 (2011)区块链技术应用的安全与监管问题 (Security Incidents and Solutions of Blockchain Technology Application)., , , , and . 计算机科学, 45 (6A): 352-355 (2018)A novel numerical scheme for a time fractional Black-Scholes equation., , , and . J. Appl. Math. Comput., 66 (1-2): 853-870 (June 2021)Robust Benchmark Structural Variant Calls of An Asian Using State-of-the-art Long-read Sequencing Technologies., , , , , , , , , and 11 other author(s). Genom. Proteom. Bioinform., 20 (1): 192-204 (2022)Distributed Blind Estimation Over Sensor Networks., and . IEEE Access, (2017)Almost output regulation for switched linear systems with bumpless transfer control under destabilizing behaviors., , , and . Appl. Math. Comput., (2022)Output regulation control for switched stochastic delay systems with dissipative property under error-dependent switching., , and . Int. J. Syst. Sci., 49 (2): 383-391 (2018)Automatic software vulnerability classification by extracting vulnerability triggers., , , , , and . J. Softw. Evol. Process., (February 2024)