Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semi-supervised learning combining co-training with active learning., , , and . Expert Syst. Appl., 41 (5): 2372-2378 (2014)S2Net: A New Service Description Model based on Heterogeneous Service Network., , and . JSW, 8 (2): 404-409 (2013)Monitoring Resources Allocation for Service Composition Under Different Monitoring Mechanisms., , , and . CISIS, page 263-270. IEEE Computer Society, (2011)Personalized Web Service Recommendation Based on QoS Prediction and Hierarchical Tensor Decomposition., , , , , and . IEEE Access, (2019)A Cloud Service Selection Method Based on Trust and User Preference Clustering., , , , , and . IEEE Access, (2019)A trust-based evaluation model for data privacy protection in cloud computing., , and . IJHPCN, 14 (2): 147-156 (2019)An Approach of Authentication Base on Modified Digital Identity Metasystem in Service-Oriented Architecture., , , and . WISM (1), volume 6987 of Lecture Notes in Computer Science, page 304-311. Springer, (2011)Defending Against Advanced Persistent Threat: A Risk Management Perspective., , , , , and . SciSec, volume 11287 of Lecture Notes in Computer Science, page 207-215. Springer, (2018)From similarity perspective: a robust collaborative filtering approach for service recommendations., , , , , and . Frontiers Comput. Sci., 13 (2): 231-246 (2019)A Novel Dynamic Cloud Service Trust Evaluation Model in Cloud Computing., , , and . TrustCom/BigDataSE, page 10-15. IEEE, (2018)