Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel requirement analysis approach for periodic control systems., , , , , , , , and . Frontiers of Computer Science, 7 (2): 214-235 (2013)Automated detection of polysomes in cryoelectron tomography., , , and . ICIP, page 2085-2089. IEEE, (2014)Access Control Scheme Supporting Attribute Revocation in Cloud Computing., , , , and . NaNA, page 379-384. IEEE, (2021)Public Auditing for Trusted Cloud Storage Services., , , , , and . IEEE Security & Privacy, 17 (1): 10-22 (2019)Towards A Scalable DAG-based Distributed Ledger for Smart Communities., , , and . WF-IoT, page 177-182. IEEE, (2019)Development of electromagnetic tomography system using LCR meter., , , , and . I2MTC, page 1-5. IEEE, (2018)Fast low-rank matrix approximation with locality sensitive hashing for quick anomaly detection., , , , , and . INFOCOM, page 1-9. IEEE, (2017)Robust Spatio-temporal Tensor Recovery for Internet Traffic Data., , , and . Trustcom/BigDataSE/ISPA, page 1404-1411. IEEE, (2016)Searchable Encryption System for Big Data Storage., , , , , and . ICPCSEE (2), volume 1452 of Communications in Computer and Information Science, page 139-150. Springer, (2021)A Testbed for Adaptive Human-Robot Collaboration., and . KI, volume 6359 of Lecture Notes in Computer Science, page 58-65. Springer, (2010)