Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the existence of some specific elements in finite fields of characteristic 2., , and . Finite Fields and Their Applications, 18 (4): 800-813 (2012)Automatic generation of test case based on GATS algorithm., , , and . GrC, page 496-500. IEEE Computer Society, (2009)A Study of Security Isolation Techniques., , , , , , , , and . ACM Comput. Surv., 49 (3): 50:1-50:37 (2016)Social Influence-based Attentive Mavens Mining and Aggregative Representation Learning for Group Recommendation., , , and . CoRR, (2019)The Model of NW Multilayer Feedforward Small-World Artificial Neural Networks and It's Applied., and . ICICA (2), volume 244 of Communications in Computer and Information Science, page 209-216. Springer, (2011)Automatic Server Hang Bug Diagnosis: Feasible Reality or Pipe Dream?, , , , and . ICAC, page 127-132. IEEE Computer Society, (2015)M-GCN: Brain-inspired memory graph convolutional network for multi-label image recognition., , , and . Neural Comput. Appl., 34 (8): 6489-6502 (2022)PerfCompass: Toward Runtime Performance Anomaly Fault Localization for Infrastructure-as-a-Service Clouds., , , and . HotCloud, USENIX Association, (2014)Association Rules Mining Based on the Discriminative Concept Lattice., , , and . ICNC (3), page 119-123. IEEE Computer Society, (2009)An adaptive detecting strategy against motion vector-based steganography., , , and . ICME, page 1-6. IEEE Computer Society, (2015)