Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Mobile Agents in Electronic Commerce by Using Undetachable Signatures from Pairings., , , and . ICEB, page 1038-1043. Academic Publishers/World Publishing Corporation, (2004)Robustness Analysis of Asynchronous Sampled-Data Multiagent Networks With Time-Varying Delays., , and . IEEE Trans. Automat. Contr., 63 (7): 2145-2152 (2018)An effective genetic algorithm for the flexible job-shop scheduling problem., , and . Expert Syst. Appl., 38 (4): 3563-3573 (2011)On Security of a White-Box Implementation of SHARK., and . ISC, volume 9290 of Lecture Notes in Computer Science, page 455-471. Springer, (2015)Variable-Length Quantization Strategy for Hashing., , , , and . ICIP, page 2239-2243. IEEE, (2019)Distributed Event-Triggered Gradient Method for Constrained Convex Minimization., , , and . IEEE Trans. Automat. Contr., 65 (2): 778-785 (2020)Indoor localization algorithm based on hybrid annealing particle swarm optimization., and . ICACI, page 330-335. IEEE, (2018)A lightweight white-box symmetric encryption algorithm against node capture for WSNs., and . WCNC, page 3058-3063. IEEE, (2014)Robust Tracking Control of Networked Control Systems: Application to a Networked DC Motor., , and . IEEE Trans. Ind. Electron., 60 (12): 5864-5874 (2013)Network-Based Predictive Control for Constrained Nonlinear Systems With Two-Channel Packet Dropouts., and . IEEE Trans. Ind. Electron., 61 (3): 1574-1582 (2014)