Author of the publication

Evaluation Criteria for Visual Cryptography Schemes via Neural Networks.

, , and . CW, page 289-292. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things., , , and . Sensors, 20 (3): 916 (2020)An improved method for measuring frame synchronization time parameters based on YOLOv4., , , and . Microprocess. Microsystems, (September 2022)Research on Group Signature Scheme with Forward Security., , , and . J. Comput. Res. Dev., 43 (12): 2069-2075 (2006)An Approach for Service Discovery Based on Semantic Peer-to-Peer., , , and . ASIAN, volume 3818 of Lecture Notes in Computer Science, page 259-260. Springer, (2005)An auditing mechanism for the security of service in grid., , , and . Concurr. Comput. Pract. Exp., 27 (8): 2041-2053 (2015)A secure mechanism of group communication for pervasive grid., , , and . Int. J. Ad Hoc Ubiquitous Comput., 4 (6): 344-353 (2009)Aeneas: real-time performance evaluation approach for distributed programs with reliability-constrains., , , , and . Clust. Comput., 10 (2): 175-186 (2007)Eidolon: Real-Time Performance Evaluation Approach for Distributed Programs Based on Capacity of Communication Links., , , , and . CIS, volume 3314 of Lecture Notes in Computer Science, page 136-141. Springer, (2004)An Authentic Measurement Mechanism of Service for Trusted Grid., , , , , and . ChinaGrid, page 167-173. IEEE Computer Society, (2008)A Control Mechanism about Quality of Service for Resource Scheduling in Multiple Virtual Machine System., , , and . PDCAT, page 518-523. IEEE Computer Society, (2010)