Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research and experiments of network attack defence system., , and . SMC (4), page 3548-3553. IEEE, (2004)Privacy-Preserving Unsupervised Domain Adaptation in Federated Setting., , , and . IEEE Access, (2020)Ship Motion Attitude Prediction Based on an Adaptive Dynamic Particle Swarm Optimization Algorithm and Bidirectional LSTM Neural Network., , and . IEEE Access, (2020)Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT., , , and . Frontiers Comput. Sci., 18 (3): 183817 (June 2024)Study and Comparison of the RTHAL-Based and ADEOS-Based RTAI Real-time Solutions for Linux., , and . IMSCCS (2), page 771-775. IEEE Computer Society, (2006)0-7695-2581-4.Research on Optimization Method of Visual Odometer Based on Point Line Feature Fusion., , and . HP3C, page 274-280. ACM, (2023)Uncorrelated Discriminant Locality Aware Embedding for Face Recognition., , and . CSIE (4), page 178-181. IEEE Computer Society, (2009)Task scheduling algorithm based on fireworks algorithm., , , , , , , and . EURASIP J. Wireless Comm. and Networking, (2018)Achieving Message-Encapsulated Leveled FHE for IoT Privacy Protection., , , and . Mob. Inf. Syst., (2020)Pareto-Q Learning Algorithm for Cooperative Agents in General-Sum Games., , and . CEEMAS, volume 3690 of Lecture Notes in Computer Science, page 576-578. Springer, (2005)