Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research and experiments of network attack defence system., , and . SMC (4), page 3548-3553. IEEE, (2004)Ship Motion Attitude Prediction Based on an Adaptive Dynamic Particle Swarm Optimization Algorithm and Bidirectional LSTM Neural Network., , and . IEEE Access, (2020)Privacy-Preserving Unsupervised Domain Adaptation in Federated Setting., , , and . IEEE Access, (2020)Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT., , , and . Frontiers Comput. Sci., 18 (3): 183817 (June 2024)Research on Optimization Method of Visual Odometer Based on Point Line Feature Fusion., , and . HP3C, page 274-280. ACM, (2023)Study and Comparison of the RTHAL-Based and ADEOS-Based RTAI Real-time Solutions for Linux., , and . IMSCCS (2), page 771-775. IEEE Computer Society, (2006)0-7695-2581-4.Uncorrelated Discriminant Locality Aware Embedding for Face Recognition., , and . CSIE (4), page 178-181. IEEE Computer Society, (2009)基于SVM的主题爬虫技术研究 (Research on Focused Crawling Technology Based on SVM)., , and . 计算机科学, 42 (2): 118-122 (2015)Cross-layer parallel cooperative spectrum sensing for heterogeneous channels based on iterative KM algorithm., , and . Clust. Comput., 22 (Supplement): 2629-2637 (2019)The state of the art in content-based image retrieval in P2P networks., and . ICIMCS, page 143-146. ACM, (2010)