Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-assisted complete analysis of three-photon hyperentangled Greenberger-Horne-Zeilinger states with nitrogen-vacancy centers in microcavities., , and . Quantum Inf. Process., 17 (7): 172 (2018)Trust and Reputation Evaluation Mechanisms in Grid Computing: A Review., and . MobiMedia, page 24-33. ACM, (2016)Long-Lasting Nanophosphors Applied to UV-Resistant and Energy Storage Perovskite Solar Cells, , , , , , , , , and . Advanced Energy Materials, (2017)Context-Aware Verifiable Cloud Computing., , and . IEEE Access, (2017)Secure Pervasive Social Communications Based on Trust in a Distributed Way., , , and . IEEE Access, (2016)Encrypted Big Data Deduplication in Cloud Storage., , , , , and . Smart Data, Chapman and Hall/CRC, (2019)Distributed Model Predictive Control of Linear Systems with Coupled Constraints Based on Collective Neurodynamic Optimization., , and . Australasian Conference on Artificial Intelligence, volume 11320 of Lecture Notes in Computer Science, page 318-328. Springer, (2018)Detection of Application-Layer Tunnels with Rules and Machine Learning., , and . SpaCCS, volume 11611 of Lecture Notes in Computer Science, page 441-455. Springer, (2019)Research on Offline Palmprint Image Enhancement., , , , and . ICIP (1), page 541-544. IEEE, (2007)A Survey on Future Internet Security Architectures., , and . IEEE Access, (2016)