Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis., , , , , , and . J. Syst. Softw., (2020)A Trust Evolution Mechanism for Mobile Social Networks Based on Wright-Fisher., , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 592-601. Springer, (2015)Supporting MAC layer multicast in IEEE 802.11n: issues and solutions., , , , and . WCNC, page 1179-1184. IEEE, (2009)Modified statistically homogeneous pixel selection for coherence estimation with multi-temporal insar images., , , , , and . IGARSS, page 2885-2888. IEEE, (2016)Demonstration of Time-Series InSAR Processing in Beijing Using a Small Stack of Gaofen-3 Differential Interferograms., , , , , , and . J. Sensors, (2019)Delay-Dependent Stability Analysis of Modular Microgrid With Distributed Battery Power and SoC Consensus Tracking., , , , and . IEEE Access, (2019)Cascaded H-bridge multilevel converter topology for large-scale photovoltaic system with balanced operation., , , , and . IECON, page 6452-6457. IEEE, (2017)Study on the intelligent map service for adaptive geo-visualization., , and . Geoinformatics, page 1-6. IEEE, (2010)Generic geo-tagged social-economic investigation and monitoring system., , and . Geoinformatics, page 1-5. IEEE, (2010)Truthful incentive mechanism with location privacy-preserving for mobile crowdsourcing systems., , , , and . Comput. Networks, (2018)