Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Second-order consensus in directed networks of identical nonlinear dynamics via impulsive control., , and . Neurocomputing, (2016)Cryptanalysis and improvement of verifiable quantum (k, n) secret sharing., and . Quantum Information Processing, 15 (2): 851-868 (2016)SDN-Based Data Transfer Security for Internet of Things., , , and . IEEE Internet of Things Journal, 5 (1): 257-268 (2018)A Verifiable $(t, n)$ Threshold Quantum State Sharing Against Denial Attack., , , and . IEEE Access, (2019)A Sequence Transformation Model for Chinese Named Entity Recognition., , , , , and . KSEM (1), volume 11061 of Lecture Notes in Computer Science, page 491-502. Springer, (2018)The State of the Art in Grid Scheduling Systems., and . ICNC (4), page 619-623. IEEE Computer Society, (2007)Sequence Generative Adversarial Network for Long Text Summarization., , , , and . ICTAI, page 242-248. IEEE, (2018)2D-Convolution Based Feature Fusion for Cross-Modal Correlation Learning., , , , and . ICCS (2), volume 11537 of Lecture Notes in Computer Science, page 131-144. Springer, (2019)Routing Attribute Data Mining Based on Rough Set Theory., , , and . ADMA, volume 3584 of Lecture Notes in Computer Science, page 276-283. Springer, (2005)A Metadata-driven Cloud Computing Application Virtualization Model., , , and . JCP, 8 (6): 1571-1579 (2013)