Author of the publication

Variational Mode Decomposition-Based Event Recognition in Perimeter Security Monitoring With Fiber Optic Vibration Sensor.

, , , , , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining parameterized role-based policies., and . CODASPY, page 255-266. ACM, (2013)scGCL: an imputation method for scRNA-seq data based on graph contrastive learning., , , , , and . Bioinform., (March 2023)Abductive Analysis of Administrative Policies in Rule-Based Access Control., , and . IEEE Trans. Dependable Secur. Comput., 11 (5): 412-424 (2014)Study on technological innovation efficiency based on DEA-Malmquist: Empirical analysis of 15 Chinese listed pharmaceutical manufacturing firms., and . IEEM, page 1504-1508. IEEE, (2015)Mining Attribute-based Access Control Policies., and . CoRR, (2013)Algorithms for mining meaningful roles., and . SACMAT, page 57-66. ACM, (2012)Variational Mode Decomposition-Based Event Recognition in Perimeter Security Monitoring With Fiber Optic Vibration Sensor., , , , , , , and . IEEE Access, (2019)A Combined Events Recognition Scheme Using Hybrid Features in Distributed Optical Fiber Vibration Sensing System., , , , , , , and . IEEE Access, (2019)The application of fuzzy mathematics to adaptive speech recognition., and . ICPR (3), page 497-500. IEEE, (1992)scSAGAN: A scRNA-seq data imputation method based on Semi-Supervised Learning and Probabilistic Latent Semantic Analysis., , , , and . BIBM, page 178-181. IEEE, (2022)