Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal and self-tuning white noise estimators with applications to deconvolution and filtering problems., , , and . Automatica, 32 (2): 199-216 (1996)Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query., , , and . IEEE Trans. Consumer Electronics, 60 (1): 164-172 (2014)Quantifying and analyzing neighborhood configuration characteristics to cellular automata for land use simulation considering data source error., , , , and . Earth Science Informatics, 5 (2): 77-86 (2012)Variable Granularity Index on Massive Service Processes., , , , and . ICWS, page 18-25. IEEE Computer Society, (2013)Scalable Euclidean Embedding for Big Data., , , and . CLOUD, page 773-780. IEEE, (2015)Dosimetric study of the deformable image registration based lung cancer adaptive radiotherapy., , , , and . BMEI, page 402-406. IEEE, (2015)RASP-QS: Efficient and Confidential Query Services in the Cloud., , , and . PVLDB, 7 (13): 1685-1688 (2014)Automatic fine-grained access control in SCADA by machine learning., , , , and . Future Generation Comp. Syst., (2019)Low-Rate DDoS Attack Detection Using Expectation of Packet Size., , , and . Security and Communication Networks, (2017)Stag hunt and trust emergence in social networks., , , , and . Future Generation Comp. Syst., (2018)