Author of the publication

An Emotional Face Evoked EEG Signal Recognition Method Based on Optimal EEG Feature and Electrodes Selection.

, , , , , , and . ICONIP (1), volume 7062 of Lecture Notes in Computer Science, page 296-305. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fuzzy Appraisement-based Applied Study on High-temperature Corrosion of a Thermal Power Plant., , , , and . FSKD (5), page 227-231. IEEE Computer Society, (2009)Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification Under Obfs4 Scenario., , , , , and . ICEA, page 205-210. ACM, (2021)Empirical Measurement and Analysis of I2P Routers., , , , , and . JNW, 9 (9): 2269-2278 (2014)Large-scale discovery and empirical analysis for I2P eepSites., , , , and . ISCC, page 444-449. IEEE Computer Society, (2017)Darknet Public Hazard Entity Recognition Based on Deep Learning., , , , , and . ICEA, page 94-100. ACM, (2021)StegoP2P: Oblivious user-driven unobservable communications., , , , and . ICC, page 7126-7131. IEEE, (2015)A learning resource recommendation algorithm based on online learning sequential behavior., , , , , and . IJWMIP, 17 (2): 1940001 (2019)Out-of-band discovery and evaluation for tor hidden services., , , , , and . SAC, page 2057-2062. ACM, (2016)Practical Deanonymization Attack in Ethereum Based on P2P Network Analysis., , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 1402-1409. IEEE, (2021)Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services., , , , , and . IEEE Internet of Things Journal, 6 (2): 1584-1593 (2019)