Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on Time Synchronization and Flow Aggregation in LDDoS Attack Based on Cross-correlation., , , , and . TrustCom, page 25-32. IEEE Computer Society, (2012)State observer based adaptive information assurance evaluation model., , and . WCNIS, page 173-178. IEEE, (2010)The secure approach of accessing to the kernel database in state key information system., , and . WCNIS, page 167-172. IEEE, (2010)Basic CAD/CAM Engineering Education through Multimedia and Network Aid., , , , , , and . ICFCE, volume 133 of Advances in Intelligent and Soft Computing, page 33-37. Springer, (2011)Research and Implementation of Electronic Commerce Logistics Distribution Management., , and . ICEE, page 2089-2092. IEEE, (2010)Robustness Analysis of Biochemical Networks using μ-Analysis and Hybrid Optimisation., , , , and . CDC/ECC, page 6234-6239. IEEE, (2005)RFormer: Transformer-based Generative Adversarial Network for Real Fundus Image Restoration on A New Clinical Benchmark., , , , , , , , and . CoRR, (2022)A Study on Improving E-Learning in Higher Engineering Education., , , , , , , and . ICFCE, volume 133 of Advances in Intelligent and Soft Computing, page 27-31. Springer, (2011)Adaptive maximum margin analysis for image recognition., , , , , and . Pattern Recognition, (2017)Quantifying robustness of biochemical network models., and . BMC Bioinformatics, (2002)