Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Finite-time stability and synchronization of memristor-based fractional-order fuzzy cellular neural networks., , , , , , and . Commun. Nonlinear Sci. Numer. Simul., (2018)Generalized projective control for leader-following multi-agent systems with predefined-time., , , , , , and . Commun. Nonlinear Sci. Numer. Simul., (December 2023)Predefined-Time Stability/Synchronization of Coupled Memristive Neural Networks With Multi-Links and Application in Secure Communication., , , , , , and . Frontiers Neurorobotics, (2021)A novel time series prediction method based on pooling compressed sensing echo state network and its application in stock market., , , , , and . Neural Networks, (July 2023)Parameters estimation and synchronization of uncertain coupling recurrent dynamical neural networks with time-varying delays based on adaptive control., , , , , and . Neural Comput. Appl., 30 (7): 2217-2227 (2018)A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme., , , , , and . J. Inf. Secur. Appl., (June 2023)Flexible construction of measurement matrices in compressed sensing based on extensions of incidence matrices of combinatorial designs., , , , and . Appl. Math. Comput., (2022)Price optimization under the extended nested logit model., , , and . Oper. Res. Lett., 51 (1): 54-59 (January 2023)New Constructions of Identity-Based Dual Receiver Encryption from Lattices., , , and . Entropy, 22 (6): 599 (2020)Intrusion Detection Method Based on Complementary Adversarial Generation Network., , and . ICSI (2), volume 13969 of Lecture Notes in Computer Science, page 260-271. Springer, (2023)