Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Approach for Computing Conflict Sets Combining Failure Probability with SAT., , , and . KSEM (2), volume 11062 of Lecture Notes in Computer Science, page 48-58. Springer, (2018)Face Detection Using R-FCN Based Deformable Convolutional Networks., , , , , and . SMC, page 4165-4170. IEEE, (2018)A Novel Authentication Scheme Based on Trust-value Updated Model in Adhoc Network., , , and . COMPSAC (1), page 643-645. IEEE Computer Society, (2007)An Feasible Key Management Scheme in Ad Hoc Network., , , and . SNPD (1), page 300-303. IEEE Computer Society, (2007)Using WordNet-Based Neighborhood for Improving Social Tag Recommendation., , , , , and . ICIC (2), volume 7390 of Lecture Notes in Computer Science, page 221-228. Springer, (2012)Significance of MMP9 and BRMS1 in metastasis and invasion of breast cancer stem cells., , , , , and . ICCA, page 943-946. IEEE, (2013)Construction of GLI1 shRNA expression vector and effects on the proliferation of ovarian cancer cells., , , , , and . ICCA, page 1264-1268. IEEE, (2013)A Novel Method of Pseudorandom Sequence Design Based on Hyperchaos System., and . IMECS, page 1337-1340. Newswood Limited, (2007)A Blending Method for Automated Social Tagging., , , , and . Web Intelligence, page 115-120. IEEE Computer Society, (2013)Non-binary quantum codes constructed from classical BCH codes., and . ICMLC, page 867-874. IEEE, (2010)