Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Security Situation Element Extraction Based on Projection Pursuit Regression., , and . IMIS, page 405-408. IEEE Computer Society, (2012)A Discrete Particle Swarm Optimization Algorithm for the Multiobjective Permutation Flowshop Sequencing Problem., , , and . ICFIE, volume 40 of Advances in Soft Computing, page 323-331. Springer, (2007)Human action recognition via multi-task learning base on spatial-temporal feature., and . Inf. Sci., (2015)A PSO-based intelligent decision algorithm for VLSI floorplanning., , and . Soft Comput., 14 (12): 1329-1337 (2010)Online optimization scheduling for scientific workflows with deadline constraint on hybrid clouds., , and . Concurrency and Computation: Practice and Experience, 28 (11): 3079-3095 (2016)Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system., , , , and . Inf. Sci., (2019)A Multi-Layer Hardware Trojan Protection Framework for IoT Chips., , , , and . IEEE Access, (2019)Salient Object Segmentation Based on Superpixel and Background Connectivity Prior., , and . IEEE Access, (2018)Addressing Imbalance in Weakly Supervised Multi-Label Learning., , and . IEEE Access, (2019)Region-Aware Image Denoising by Exploring Parameter Preference., , , and . IEEE Trans. Circuits Syst. Video Techn., 28 (9): 2433-2438 (2018)