Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-fidelity reversible data hiding using dynamic prediction and expansion., , , , and . J. Electronic Imaging, 28 (1): 013013 (2019)Equivalent Modeling of Inverter Air Conditioners for Providing Frequency Regulation Service., , and . IEEE Trans. Industrial Electronics, 66 (2): 1413-1423 (2019)Methods and Systems for a Smart Energy City., , and . IEEE Trans. Industrial Electronics, 66 (2): 1363-1367 (2019)An Efficient Marine Oil Spillage Identification Scheme Based on an Improved Active Contour Model Using Fully Polarimetric SAR Imagery., , , , , , , , , and . IEEE Access, (2018)Attention for Web Directory Advertisements: A Top-Down or Bottom-Up Process?, , , and . Int. J. Hum. Comput. Interaction, 35 (1): 89-98 (2019)SGICT Builds an Optimization-Based System for Daily Berth Planning., , , and . Interfaces, 46 (4): 281-296 (2016)Why do I Invite Friends to Join: an Empirical Study of Mobile Social Network Game., , and . PACIS, page 137. (2014)Learning Relative Similarity by Stochastic Dual Coordinate Ascent., , , , and . AAAI, page 2142-2148. AAAI Press, (2014)A Secure Digital Watermark Skeleton Based on Cloud Computing Web Services., and . EMC/HumanCom, volume 260 of Lecture Notes in Electrical Engineering, page 527-533. Springer, (2013)Quality of IS in Services: Theory of Constructs for Service, Information, and System.. AMCIS, page 4. Association for Information Systems, (2008)