Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Android Malicious Code Detection Method Based on Improved DCA Algorithm., , , , , and . Entropy, 19 (2): 65 (2017)Image compression based on orthogonal balanced multiwavelets with symmetry/antisymmetry., and . MIPPR, volume 10611 of SPIE Proceedings, page 106110Y. SPIE, (2017)A survey of reversible data hiding based on HEVC video compression format., , and . AIIPCC, page 47:1-47:9. ACM, (2019)Receiver-Initiated Handshaking MAC Based on Traffic Estimation for Underwater Sensor Networks., , , , , , , and . Sensors, 18 (11): 3895 (2018)Generalized Snell's Law and Its Verification by Metasurface., and . IMIS, volume 1195 of Advances in Intelligent Systems and Computing, page 364-372. Springer, (2020)Integrating the Intelligent Driver Model With the Action Point Paradigm to Enhance the Performance of Autonomous Driving., , , and . IEEE Access, (2020)Sub-1 ns characterization methodology for transistor electrical parameter extraction., , , , , and . Microelectron. Reliab., (2018)A Novel NE-DFT Channel Estimation Scheme for Millimeter-Wave Massive MIMO Vehicular Communications., and . IEEE Access, (2020)Singlet/triplet exciton dissociation and charge recombination in donor-acceptor ThQs-C60/PDIxCN2 complexes., , and . J. Comput. Chem., 40 (9): 997-1004 (2019)Impervious Surface Extraction by Linear Spectral Mixture Analysis with Post-Processing Model., , , , , and . IEEE Access, (2020)