Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A DCT-based privacy-preserving approach for efficient data mining., , , , , and . Security and Communication Networks, 8 (18): 3641-3652 (2015)Finite-Time Formation Control for Unmanned Aerial Vehicle Swarm System With Time-Delay and Input Saturation., , , and . IEEE Access, (2019)Development of 300-kV Air-Insulation Standard Impulse Measurement System., , , , , , and . IEEE Trans. Instrumentation and Measurement, 64 (6): 1627-1635 (2015)Utilizing Fragmented Bandwidth in a Staggered Striping Multimedia System., and . DEXA, volume 1873 of Lecture Notes in Computer Science, page 161-170. Springer, (2000)New Entry Threats and Firm Performance in the IT Industry: The Moderating Role of Board Independence., , and . ICIS, Association for Information Systems, (2017)New Entry Threats, Firm Governance, and Innovation in the U.S. IT Industry., , and . ICIS, Association for Information Systems, (2015)Anti-vibration design and research of four-wire type vortex flow meter., , , and . I2MTC, page 1-6. IEEE, (2018)Hexapod Adaptive Gait Inspired by Human Behavior for Six-Legged Robot Without Force Sensor., , , and . J. Intell. Robotic Syst., 88 (1): 19-35 (2017)New Entry Threats and Information Disclosure: Evidence from the U.S. IT Industry., , and . ICIS, Association for Information Systems, (2018)Reducing Garbage Collection Overhead in SSD Based on Workload Prediction., , , , , , , , , and . HotStorage, USENIX Association, (2019)