Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A quantum secret sharing scheme with verifiable function., , , and . CoRR, (2020)A Hybrid Quantum Secret Sharing Scheme Based on Mutually Unbiased Bases., , , and . FCS, volume 1286 of Communications in Computer and Information Science, page 595-607. Springer, (2020)A Verifiable Quantum Secret Sharing Scheme Based on a Single Qubit., , , and . CoRR, (2020)Robust adaptive global synchronization of complex dynamical networks by adjusting time-varying coupling strength, , and . Physica A: Statistical Mechanics and its Applications, 387 (5-6): 1369--1380 (Feb 15, 2008)An Application of Fuzzy Logic to Usage Parameter control in ATM Networks., and . FSKD, page 295-299. (2002)Peer-assisted packet loss repair for IPTV video multicast., , , and . ACM Multimedia, page 401-410. ACM, (2009)An Efficient Overlay Link Performance Monitoring Technique., , and . Networking, volume 3976 of Lecture Notes in Computer Science, page 513-524. Springer, (2006)Assessing the Impact of Climate Change on Soil water Balance in the Loess Plateau of China., , and . CCTA (2), volume 294 of IFIP Advances in Information and Communication Technology, page 871-880. Springer, (2008)A Unifying Method for Outlier and Change Detection from Data Streams Based on Local Polynomial Fitting., , and . PAKDD, volume 4426 of Lecture Notes in Computer Science, page 150-161. Springer, (2007)A repair Dispatching algorithm based on fog computing in smart grid., , , , , and . WOCC, page 1-4. IEEE, (2019)