Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Function projective synchronization of different chaotic systems., , and . ICNC, page 940-944. IEEE, (2012)Image Encryption Scheme Based on Multiple Chaotic Maps.. EIDWT, page 261-266. (2013)Collaborative geospatial web services for multi-dimension remote sensing data., , , , , and . ICDIM, page 456-463. IEEE, (2008)Analysis of Electromagnetic Pulse Coupling Inside Enclosure with Aperture Cable., , and . ISKE, page 295-297. IEEE, (2015)A secure cloud storage system supporting privacy-preserving fuzzy deduplication., , and . Soft Comput., 20 (4): 1437-1448 (2016)Weapon System Capability Assessment under uncertainty based on the evidential reasoning approach., , , , and . Expert Syst. Appl., 38 (11): 13773-13784 (2011)A Patch-Based Saliency Detection Method for Assessing the Visual Privacy Levels of Objects in Photos., , , and . IEEE Access, (2017)Control and pricing in stochastic networks with concurrent resource occupancy., and . SIGMETRICS Performance Evaluation Review, 32 (2): 50-52 (2004)Collective sparse symmetric non-negative matrix factorization for identifying overlapping communities in resting-state brain functional networks., , and . NeuroImage, (2018)Algorithmic randomness based feature selection for traditional Chinese chronic gastritis diagnosis., , , , , and . Neurocomputing, (2014)