Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel method to reconstruct normalized difference vegetation index time series based on temporal-spatial iteration estimation., , , and . IGARSS, page 1654-1657. IEEE, (2015)A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks., , , and . Computers & Electrical Engineering, (2015)A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof., , , , and . Security and Communication Networks, 8 (18): 3847-3863 (2015)An improved SFMEA method integrated with assistive techniques., and . ISSRE (Supplemental Proceedings), page 343-348. IEEE Computer Society, (2013)A Light-Weight and Accurate Method of Static Integer-Overflow-to-Buffer-Overflow Vulnerability Detection., , , , , , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 404-423. Springer, (2018)A Temporal-Spatial Iteration Method to Reconstruct NDVI Time Series Datasets., , , , and . Remote Sensing, 7 (7): 8906-8924 (2015)Knowledge graph for TCM health preservation: Design, construction, and applications., , , , , , , and . Artificial Intelligence in Medicine, (2017)Sentiment Tendency Analysis of NPC&CPPCC in German News., , and . WISA, volume 11817 of Lecture Notes in Computer Science, page 298-308. Springer, (2019)Application of Software Safety Analysis Using Event-B., and . SERE (Companion), page 137-144. IEEE, (2013)A novel three-factor authentication and key agreement scheme providing anonymity in global mobility networks., and . Security and Communication Networks, 9 (16): 3428-3443 (2016)