-
1
-
-
84888321338
-
Summarizing conceptual graphs for automatic summarization task
-
Berlin, Germany: Springer
-
S. Miranda-Jiménez, A. Gelbukh, G. Sidorov, "Summarizing conceptual graphs for automatic summarization task, " in Conceptual Structures for STEM Research and Education. Berlin, Germany: Springer, 2013, pp. 245-253.
-
(2013)
Conceptual Structures for STEM Research and Education
, pp. 245-253
-
-
Miranda-Jiménez, S.1
Gelbukh, A.2
Sidorov, G.3
-
2
-
-
84878347084
-
Assessing sentence scoring techniques for extractive text summarization
-
R. Ferreira, L. de S. Cabral, R. D. Lins, "Assessing sentence scoring techniques for extractive text summarization, " Expert Syst. Appl., vol. 40, no. 14, pp. 5755-5764, 2013.
-
(2013)
Expert Syst. Appl.
, vol.40
, Issue.14
, pp. 5755-5764
-
-
Ferreira, R.1
De Cabral, L.S.2
Lins, R.D.3
-
3
-
-
84866061150
-
Using Wikipedia and conceptual graph structures to generate questions for academic writing support
-
Sep.
-
M. Liu, R. A. Calvo, A. Aditomo, L. A. Pizzato, "Using Wikipedia and conceptual graph structures to generate questions for academic writing support, " IEEE Trans. Learn. Technol., vol. 5, no. 3, pp. 251-263, Sep. 2012.
-
(2012)
IEEE Trans. Learn. Technol.
, vol.5
, Issue.3
, pp. 251-263
-
-
Liu, M.1
Calvo, R.A.2
Aditomo, A.3
Pizzato, L.A.4
-
4
-
-
84856483205
-
Extracting simplified statements for factual question generation
-
M. Heilman and N. A. Smith, "Extracting simplified statements for factual question generation, " in Proc. QG 3rd Workshop Question Generat., 2010, pp. 11-20.
-
(2010)
Proc. QG 3rd Workshop Question Generat.
, pp. 11-20
-
-
Heilman, M.1
Smith, N.A.2
-
5
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
May
-
D. X. Song, D. Wagner, A. Perrig, "Practical techniques for searches on encrypted data, " in Proc. IEEE Symp. Secur. Privacy, May 2000, pp. 44-55.
-
(2000)
Proc. IEEE Symp. Secur. Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
6
-
-
44049096900
-
Privacy preserving keyword searches on remote encrypted data
-
Y.-C. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data, " in Proc. ACNS, 2005, pp. 391-421.
-
(2005)
Proc. ACNS
, pp. 391-421
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
7
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. A. Garay, S. Kamara, R. Ostrovsky, "Searchable symmetric encryption: Improved definitions and efficient constructions, " in Proc. ACM CCS, 2006, pp. 79-88.
-
(2006)
Proc. ACM CCS
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
8
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
Jun.
-
C. Wang, N. Cao, J. Li, "Secure ranked keyword search over encrypted cloud data, " in Proc. IEEE 30th Int. Conf. Distrib. Comput. Syst. (ICDCS), Jun. 2010, pp. 253-262.
-
(2010)
Proc. IEEE 30th Int. Conf. Distrib. Comput. Syst. (ICDCS)
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
-
9
-
-
84905923774
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
Jan.
-
N. Cao, C. Wang, M. Li, K. Ren, W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 222-233, Jan. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.1
, pp. 222-233
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
10
-
-
84877939257
-
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
W. Sun, B. Wang, N. Cao, "Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking, " in Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. Secur., 2013, pp. 71-82.
-
(2013)
Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. Secur.
, pp. 71-82
-
-
Sun, W.1
Wang, B.2
Cao, N.3
-
11
-
-
84888339077
-
Efficient multi-keyword ranked query over encrypted data in cloud computing
-
Jan.
-
R. Li, Z. Xu, W. Kang, "Efficient multi-keyword ranked query over encrypted data in cloud computing, " Future Generat. Comput. Syst., vol. 30, pp. 179-190, Jan. 2014.
-
(2014)
Future Generat. Comput. Syst.
, vol.30
, pp. 179-190
-
-
Li, R.1
Xu, Z.2
Kang, W.3
-
12
-
-
84922280033
-
Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing
-
Z. Fu, X. Sun, Q. Liu, "Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing, " IEICE Trans. Commun., vols. E98-B, no. 1, pp. 190-200, 2015.
-
(2015)
IEICE Trans. Commun.
, vol.E98-B
, Issue.1
, pp. 190-200
-
-
Fu, Z.1
Sun, X.2
Liu, Q.3
-
13
-
-
84962448916
-
A secure and dynamic multikeyword ranked search scheme over encrypted cloud data
-
Jan.
-
Z. Xia, X. Wang, X. Sun, Q. Wang, "A secure and dynamic multikeyword ranked search scheme over encrypted cloud data, " IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340-352, Jan. 2016.
-
(2016)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.2
, pp. 340-352
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, Q.4
-
14
-
-
84902815285
-
Semantic keyword search based on trie over encrypted cloud data
-
Z. Fu, J. Shu, X. Sun, "Semantic keyword search based on trie over encrypted cloud data, " in Proc. 2nd Int. Workshop Secur. Cloud Comput., 2014, pp. 59-62.
-
(2014)
Proc. 2nd Int. Workshop Secur. Cloud Comput.
, pp. 59-62
-
-
Fu, Z.1
Shu, J.2
Sun, X.3
-
16
-
-
67449144358
-
Conceptual graphs
-
Amsterdam, The Netherlands: Elsevier
-
J. F. Sowa, "Conceptual graphs, " in Handbook of Knowledge Representation. Amsterdam, The Netherlands: Elsevier, 2008, pp. 213-237.
-
(2008)
Handbook of Knowledge Representation
, pp. 213-237
-
-
Sowa, J.F.1
-
17
-
-
84948982735
-
-
Berlin Germany: Springer
-
J. Zhong, H. Zhu, J. Li, Conceptual Graph Matching for Semantic Search. Conceptual Structures: Integration and Interfaces. Berlin, Germany: Springer, 2002, pp. 92-106.
-
(2002)
Conceptual Graph Matching for Semantic Search. Conceptual Structures: Integration and Interfaces
, pp. 92-106
-
-
Zhong, J.1
Zhu, H.2
Li, J.3
-
18
-
-
84868342574
-
Structured encryption for conceptual graphs
-
Berlin, Germany: Springer
-
G. S. Poh, M. S. Mohamad, M. R. Zaba, "Structured encryption for conceptual graphs, " in Advances in Information and Computer Security. Berlin, Germany: Springer, 2012, pp. 105-122.
-
(2012)
Advances in Information and Computer Security
, pp. 105-122
-
-
Poh, G.S.1
Mohamad, M.S.2
Zaba, M.R.3
-
19
-
-
41249096973
-
Automatically building conceptual graphs using VerbNet and WordNet
-
Dublin, Republic of Ireland
-
S. Hensman and J. Dunnion, "Automatically building conceptual graphs using VerbNet and WordNet, " in Proc. Int. Symp. Inf. Commun. Technol., Dublin, Republic of Ireland, 2004, pp. 115-120.
-
(2004)
Proc. Int. Symp. Inf. Commun. Technol.
, pp. 115-120
-
-
Hensman, S.1
Dunnion, J.2
-
20
-
-
70849131456
-
Secure KNN computation on encrypted databases
-
W. K. Wong, D. W. Cheung, B. Kao, "Secure KNN computation on encrypted databases, " in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2009, pp. 139-152.
-
(2009)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.2
Kao, B.3
-
21
-
-
84982135416
-
Enabling personalized search over encrypted outsourced data with efficiency improvement
-
Sep.
-
Z. Fu, K. Ren, J. Shu, X. Sun, F. Huang, "Enabling personalized search over encrypted outsourced data with efficiency improvement, " IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 9, pp. 2546-2559, Sep. 2016.
-
(2016)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.9
, pp. 2546-2559
-
-
Fu, Z.1
Ren, K.2
Shu, J.3
Sun, X.4
Huang, F.5
-
22
-
-
84983268338
-
Towards efficient content-aware search over encrypted outsourced data in cloud
-
San Francisco, CA, USA, Apr.
-
Z. Fu, X. Sun, S. Ji, G. Xie, "Towards efficient content-aware search over encrypted outsourced data in cloud, " in Proc. 35th Annu. IEEE Int. Conf. Comput. Commun. (IEEE INFOCOM), San Francisco, CA, USA, Apr. 2016, pp. 1-9, doi: 10. 1109/INFOCOM. 2016. 7524606.
-
(2016)
Proc. 35th Annu. IEEE Int. Conf. Comput. Commun. (IEEE INFOCOM)
, pp. 1-9
-
-
Fu, Z.1
Sun, X.2
Ji, S.3
Xie, G.4
-
23
-
-
43349086436
-
Zerber: R-Confidential indexing for distributed documents
-
S. Zerr, E. Demidova, D. Olmedilla, W. Nejdl, M. Winslett, S. Mitra, "Zerber: R-Confidential indexing for distributed documents, " in Proc. 11th Int. Conf. Extending Database Technol. (EDBT), 2008, pp. 287-298.
-
(2008)
Proc. 11th Int. Conf. Extending Database Technol. (EDBT)
, pp. 287-298
-
-
Zerr, S.1
Demidova, E.2
Olmedilla, D.3
Nejdl, W.4
Winslett, M.5
Mitra, S.6
-
24
-
-
0002848777
-
Exploring the similarity space
-
J. Zobel and A. Moffat, "Exploring the similarity space, " ACM SIGIR Forum, vol. 32, no. 1, pp. 18-34, 1998.
-
(1998)
ACM SIGIR Forum
, vol.32
, Issue.1
, pp. 18-34
-
-
Zobel, J.1
Moffat, A.2
-
25
-
-
84963538055
-
An efficient privacy-preserving ranked keyword search method
-
Apr.
-
C. Chen, et al., "An efficient privacy-preserving ranked keyword search method, " IEEE Trans. Parallel Distrib. Syst., vol. 27, no, 4, pp. 951-963, Apr. 2016.
-
(2016)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.4
, pp. 951-963
-
-
Chen, C.1
-
26
-
-
85077359111
-
Enabling semantic search based on conceptual graphs over encrypted outsourced data
-
to be published
-
Z. Fu, F. Huang, X. Sun, A. V. Vasilakos, C. Yang, "Enabling semantic search based on conceptual graphs over encrypted outsourced data, " IEEE Trans. Serv. Comput., to be published. doi: 10. 1109/TSC. 2016. 2622697.
-
IEEE Trans. Serv. Comput.
-
-
Fu, Z.1
Huang, F.2
Sun, X.3
Vasilakos, A.V.4
Yang, C.5
-
27
-
-
84869394463
-
Dynamic searchable symmetric encryption
-
S. Kamara, C. Papamanthou, T. Roeder, "Dynamic searchable symmetric encryption, " in Proc. ACM Conf. Comput. Commun. Secur., 2012, pp. 965-976.
-
(2012)
Proc. ACM Conf. Comput. Commun. Secur.
, pp. 965-976
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
30
-
-
84991088919
-
Towards efficient multikeyword fuzzy search over encrypted outsourced data with accuracy improvement
-
Dec.
-
Z. Fu, X. Wu, C. Guan, X. Sun, K. Ren, "Towards efficient multikeyword fuzzy search over encrypted outsourced data with accuracy improvement, " IEEE Trans. Inf. Forensics Security, vol. 11, no. 12, pp. 2706-2716, Dec. 2016, doi: 10. 1109/TIFS. 2016. 2596138.
-
(2016)
IEEE Trans. Inf. Forensics Security
, vol.11
, Issue.12
, pp. 2706-2716
-
-
Fu, Z.1
Wu, X.2
Guan, C.3
Sun, X.4
Ren, K.5
-
31
-
-
84986631527
-
A privacypreserving and copy-deterrence content-based image retrieval scheme in cloud computing
-
Nov.
-
Z. Xia, X. Wang, L. Zhang, Z. Qin, X. Sun, K. Ren, "A privacypreserving and copy-deterrence content-based image retrieval scheme in cloud computing, " IEEE Trans. Inf. Forensics Security, vol. 11, no. 11, pp. 2594-2608, Nov. 2016, doi: 10. 1109/TIFS. 2016. 2590944.
-
(2016)
IEEE Trans. Inf. Forensics Security
, vol.11
, Issue.11
, pp. 2594-2608
-
-
Xia, Z.1
Wang, X.2
Zhang, L.3
Qin, Z.4
Sun, X.5
Ren, K.6
-
32
-
-
84928106743
-
Mutual verifiable provable data auditing in public cloud storage
-
Y. Ren, J. Shen, J. Wang, J. Han, S. Lee, "Mutual verifiable provable data auditing in public cloud storage, " J. Internet Technol., vol. 16, no. 2, pp. 317-323, 2015.
-
(2015)
J. Internet Technol.
, vol.16
, Issue.2
, pp. 317-323
-
-
Ren, Y.1
Shen, J.2
Wang, J.3
Han, J.4
Lee, S.5
-
33
-
-
84959421728
-
A robust regularization path algorithm for-support vector classification
-
to be published.
-
B. Gu and V. S. Sheng, "A robust regularization path algorithm for-support vector classification, " IEEE Trans. Neural Netw. Lear. Syst., to be published. doi: 10. 1109/TNNLS. 2016. 2527796.
-
IEEE Trans. Neural Netw. Lear. Syst.
-
-
Gu, B.1
Sheng, V.S.2
-
34
-
-
84925310488
-
Enabling secure outsourced cloud data
-
Feb.
-
G. Sankareeswari, S. Selvi, R. Vidhyalakshmi, "Enabling secure outsourced cloud data, " in Proc. IEEE Int. Conf. Inf. Commun. Embedded Syst. (ICICES), Feb. 2014, pp. 1-6.
-
(2014)
Proc. IEEE Int. Conf. Inf. Commun. Embedded Syst. (ICICES)
, pp. 1-6
-
-
Sankareeswari, G.1
Selvi, S.2
Vidhyalakshmi, R.3
-
35
-
-
84960539113
-
Verifiable auditing for outsourced database in cloud computing
-
Nov.
-
J. Wang, X. Chen, X. Huang, I. You, Y. Xiang, "Verifiable auditing for outsourced database in cloud computing, " IEEE Trans. Comput., vol. 64, no. 11, pp. 3293-3303, Nov. 2015.
-
(2015)
IEEE Trans. Comput.
, vol.64
, Issue.11
, pp. 3293-3303
-
-
Wang, J.1
Chen, X.2
Huang, X.3
You, I.4
Xiang, Y.5
-
36
-
-
84958525739
-
Highly efficient indexing for privacy-preserving multi-keyword query over encrypted cloud data
-
F. Cheng, Q. Wang, Q. Zhang, "Highly efficient indexing for privacy-preserving multi-keyword query over encrypted cloud data, " in Proc. Int. Conf. Web-Age Inf. Manage., 2014, pp. 348-359.
-
(2014)
Proc. Int. Conf. Web-Age Inf. Manage.
, pp. 348-359
-
-
Cheng, F.1
Wang, Q.2
Zhang, Q.3
-
37
-
-
80051880293
-
Authorized private keyword search over encrypted data in cloud computing
-
Jun.
-
M. Li, S. Yu, N. Cao, "Authorized private keyword search over encrypted data in cloud computing, " in Proc. IEEE 31st Int. Conf. Distrib. Comput. Syst. (ICDCS), Jun. 2011, pp. 383-392.
-
(2011)
Proc. IEEE 31st Int. Conf. Distrib. Comput. Syst. (ICDCS)
, pp. 383-392
-
-
Li, M.1
Yu, S.2
Cao, N.3
-
38
-
-
84921064425
-
Fast range query processing with strong privacy protection for cloud computing
-
R. Li, A. X. Liu, A. L. Wang, "Fast range query processing with strong privacy protection for cloud computing, " Proc. VLDB Endowment, vol. 7, no. 14, pp. 1953-1964, 2014.
-
(2014)
Proc. VLDB Endowment
, vol.7
, Issue.14
, pp. 1953-1964
-
-
Li, R.1
Liu, A.X.2
Wang, A.L.3
-
39
-
-
84906242615
-
New algorithms for secure outsourcing of modular exponentiations
-
Sep.
-
X. Chen, J. Li, J. Ma, Q. Tang, W. Lou, "New algorithms for secure outsourcing of modular exponentiations, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 9, pp. 2386-2396, Sep. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.9
, pp. 2386-2396
-
-
Chen, X.1
Li, J.2
Ma, J.3
Tang, Q.4
Lou, W.5
-
40
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
Aug.
-
C. Wang, N. Cao, K. Ren, "Enabling secure and efficient ranked keyword search over outsourced cloud data, " IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
-
41
-
-
84921381171
-
Identity-based encryption with outsourced revocation in cloud computing
-
Feb.
-
J. Li, J. Li, X. Chen, C. Jia, W. Lou, "Identity-based encryption with outsourced revocation in cloud computing, " IEEE Trans. Comput., vol. 64, no. 2, pp. 425-437, Feb. 2015.
-
(2015)
IEEE Trans. Comput.
, vol.64
, Issue.2
, pp. 425-437
-
-
Li, J.1
Li, J.2
Chen, X.3
Jia, C.4
Lou, W.5
-
42
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
May
-
Q. Wang, C. Wang, K. Ren, W. Lou, J. Li, "Enabling public auditability and data dynamics for storage security in cloud computing, " IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5, pp. 847-859, May 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
43
-
-
84963939892
-
Privacy preserving ranked multikeyword search for multiple data owners in cloud computing
-
May
-
W. Zhang, Y. Lin, S. Xiao, "Privacy preserving ranked multikeyword search for multiple data owners in cloud computing, " IEEE Trans. Comput., vol. 65, no. 5, pp. 1566-1577, May 2016.
-
(2016)
IEEE Trans. Comput.
, vol.65
, Issue.5
, pp. 1566-1577
-
-
Zhang, W.1
Lin, Y.2
Xiao, S.3
-
44
-
-
84898688007
-
Private searching on streaming data based on keyword frequency
-
Mar./Apr.
-
X. Yi, E. Bertino, J. Vaidya, "Private searching on streaming data based on keyword frequency, " IEEE Trans. Depend. Sec. Comput., vol. 11, no. 2, pp. 155-167, Mar./Apr. 2014.
-
(2014)
IEEE Trans. Depend. Sec. Comput.
, vol.11
, Issue.2
, pp. 155-167
-
-
Yi, X.1
Bertino, E.2
Vaidya, J.3
-
45
-
-
84930354650
-
Privacy-preserving smart similarity search based on Simhash over encrypted data in cloud computing
-
Z. Fu, J. Shu, J. Wang, Y. Liu, S. Lee, "Privacy-preserving smart similarity search based on Simhash over encrypted data in cloud computing, " J. Internet Technol., vol. 16, no. 3, pp. 453-460, 2015.
-
(2015)
J. Internet Technol.
, vol.16
, Issue.3
, pp. 453-460
-
-
Fu, Z.1
Shu, J.2
Wang, J.3
Liu, Y.4
Lee, S.5
-
46
-
-
84981328411
-
A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment
-
Q. Liu, W. Cai, J. Shen, Z. Fu, X. Liu, N. Linge, "A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment, " Secur. Commun. Netw., vol. 9, no. 17, pp. 4002-4012, 2016.
-
(2016)
Secur. Commun. Netw.
, vol.9
, Issue.17
, pp. 4002-4012
-
-
Liu, Q.1
Cai, W.2
Shen, J.3
Fu, Z.4
Liu, X.5
Linge, N.6
-
47
-
-
84898043315
-
Achieving effective cloud search services: Multi-keyword ranked search over encrypted cloud data supporting synonym query
-
Feb.
-
Z. Fu, X. Sun, N. Linge, L. Zhou, "Achieving effective cloud search services: Multi-keyword ranked search over encrypted cloud data supporting synonym query, " IEEE Trans. Consum. Electron., vol. 60, no. 1, pp. 164-172, Feb. 2014.
-
(2014)
IEEE Trans. Consum. Electron.
, vol.60
, Issue.1
, pp. 164-172
-
-
Fu, Z.1
Sun, X.2
Linge, N.3
Zhou, L.4
-
48
-
-
84995871772
-
A belief propagation-based method for task allocation in open and dynamic cloud environments
-
Jan.
-
Y. Kong, M. Zhang, D. Ye, "A belief propagation-based method for task allocation in open and dynamic cloud environments, " Knowl.-based Syst., vol. 115, pp. 123-132, Jan. 2017.
-
(2017)
Knowl.-based Syst.
, vol.115
, pp. 123-132
-
-
Kong, Y.1
Zhang, M.2
Ye, D.3
-
49
-
-
85012903188
-
Cross-heterogeneous-database age estimation through correlation representation learning
-
May
-
Q. Tian and S. Chen, "Cross-heterogeneous-database age estimation through correlation representation learning, " Neurocomputing, vol. 238, pp. 286-295, May 2017.
-
(2017)
Neurocomputing
, vol.238
, pp. 286-295
-
-
Tian, Q.1
Chen, S.2
-
50
-
-
84991778564
-
High dimension space projection-based biometric encryption for fingerprint with fuzzy minutia
-
Z. Wu, B. Liang, L. You, "High dimension space projection-based biometric encryption for fingerprint with fuzzy minutia, " Soft Comput., vol. 20, no. 12, pp. 4907-4918, 2016.
-
(2016)
Soft Comput.
, vol.20
, Issue.12
, pp. 4907-4918
-
-
Wu, Z.1
Liang, B.2
You, L.3
|