Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generation Scheduling of a Hydrothermal System Considering Multiple Provincial Peak-Shaving Demands., , , , and . IEEE Access, (2019)An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection., , , , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 2070-2079. IOS Press, (2014)A Novel Verifiably Encrypted Signature from Weil Pairing., , , , and . EMC/HumanCom, volume 260 of Lecture Notes in Electrical Engineering, page 603-607. Springer, (2013)Efficient Key Management Scheme for SCADA System., , , , and . EMC/HumanCom, volume 260 of Lecture Notes in Electrical Engineering, page 619-625. Springer, (2013)Filter-Based Coded-Excitation System for High Speed Ultrasonic Imaging., and . IEEE Trans. Med. Imaging, 17 (6): 923-934 (1998)Consensus-based sparse signal reconstruction algorithm for wireless sensor networks., , , and . IJDSN, (2016)Innovia Vehicle Radiated Emission Investigation and CENELEC Compliance Solution.. VTC Spring, page 1-5. IEEE, (2016)A Novel Hash-Based RFID Grouping Authentication Protocol on Tag Groups and Multiple Readers., , , , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 2162-2171. IOS Press, (2014)A semantic tree-based approach for sketch-based 3D model retrieval., , and . ICPR, page 3880-3885. IEEE, (2016)A Four-Stage Hybrid Feature Subset Selection Approach for Network Traffic Classification Based on Full Coverage., , and . SpaCCS, volume 11342 of Lecture Notes in Computer Science, page 178-191. Springer, (2018)