Author of the publication

Data reconstruction with information granules: An augmented method of fuzzy clustering.

, , , and . Appl. Soft Comput., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Information Hiding Technique for Remote Sensing Image., , and . ADMA, volume 3584 of Lecture Notes in Computer Science, page 423-430. Springer, (2005)Designing Fuzzy Sets With the Use of the Parametric Principle of Justifiable Granularity., and . IEEE Trans. Fuzzy Syst., 24 (2): 489-496 (2016)高分辨率遥感图像配准并行加速方法 (Parallel Acceleration Method for Very High Resolution Remote Sensing Image Registration)., and . 计算机科学, 42 (9): 29-32 (2015)Experimental Evaluation of Transformer Internal Fault Detection Based on V-I Characteristics., , , , , , and . IEEE Trans. Ind. Electron., 67 (5): 4108-4119 (2020)Design and Experiments of Electromagnetic Heating Forming Technology., , , , , , , , , and . IEEE Access, (2019)Efficient optimal and suboptimal radio resource allocation in OFDMA system., and . IEEE Trans. Wirel. Commun., 7 (2): 440-445 (2008)Landslide Susceptibility Analysis Based on Data Field., and . J. Softw., 6 (1): 108-115 (2011)FTP: An Approximate Fast Privacy-Preserving Equality Test Protocol for Authentication in Internet of Things., , , and . Secur. Commun. Networks, (2018)DE-RSTC: A rational secure two-party computation protocol based on direction entropy., , , , and . Int. J. Intell. Syst., 37 (11): 8947-8967 (2022)An effective and practical gradient inversion attack., , , , , and . Int. J. Intell. Syst., 37 (11): 9373-9389 (2022)