Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Global Convergence of a Special Case of the DAI-Yuan Family without Line Search., and . APJOR, 25 (3): 411-420 (2008)Duth: a user-friendly dual-factor authentication for Android smartphone devices., , , and . Security and Communication Networks, 8 (7): 1213-1222 (2015)An Analysis of Dynamic Game Strategy of Privacy Protection in Personalization., , and . WHICEB, page 4. Association for Information Systems, (2014)Tumor Boundary Extraction in Multislice MR Brain Images Using Region and Contour Deformation., , , , , and . MIAR, page 183-187. IEEE Computer Society, (2001)Information Diffusion Model Based on Privacy Setting in Online Social Networking Services., , and . Comput. J., 58 (4): 536-548 (2015)Efficient attribute based sequential aggregate signature for wireless sensor networks., , , , and . IJSNet, 16 (3): 172-184 (2014)Theoretical study on the mechanism of the gas-phase reaction of diborane(3) anion with carbon disulfide., , , and . Journal of Computational Chemistry, 23 (3): 414-419 (2002)Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks., , , and . IEEE Internet of Things Journal, 4 (1): 29-39 (2017)Incremental feature weighting for fuzzy feature selection., , , , and . Fuzzy Sets and Systems, (2019)V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service., , , , and . Mobile Information Systems, (2015)