Author of the publication

云计算环境下隐私数据的隐式攻击保护 (Privacy Protection from Implicit Attacks in Cloud Computing Environment).

, , , and . 计算机科学, 43 (9): 184-187 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Roller Bearing Fault Diagnosis Based on Nonlinear Redundant Lifting Wavelet Packet Analysis., , , , and . Sensors, 11 (1): 260-277 (2011)Efficient Planning and Solving Algorithm of S -Shape Acceleration and Deceleration., , and . Wirel. Commun. Mob. Comput., (2020)A product modular design method based on axiomatic design., , , , and . CSCWD, page 282-288. IEEE, (2012)An Improved Force Feedback Control Algorithm for Active Tendons., , and . Sensors, 12 (8): 11360-11371 (2012)Adaptive Redundant Lifting Wavelet Transform Based on Fitting for Fault Feature Extraction of Roller Bearings., , , and . Sensors, 12 (4): 4381-4398 (2012)Parameters Tracking Differentiator based on the Fuzzy Control and Varied Sliding Mode., , , and . J. Networks, 9 (1): 78-84 (2014)Application of Self-optimization Closed-Loop Input-shaping with Parameter of Chaotic Particle Swarm in Coaxial Drive Printing System., , , and . J. Networks, 9 (6): 1632-1639 (2014)Standing-Posture Recognition in Human-Robot Collaboration Based on Deep Learning and the Dempster-Shafer Evidence Theory., , , and . Sensors, 20 (4): 1158 (2020)A geometric error budget method to improve machining accuracy reliability of multi-axis machine tools., , , , and . J. Intell. Manuf., 30 (2): 495-519 (2019)Prediction of Ammunition Storage Reliability Based on Improved Ant Colony Algorithm and BP Neural Network., , , and . Complex., (2019)