Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting cyclostationary difference in anti-jamming method based on single channel source separation., , and . Automatic Control and Computer Sciences, 50 (4): 226-232 (2016)A Novel Adaptive Model Predictive Control for Proton Exchange Membrane Fuel Cell in DC Microgrids., , , , , , and . IEEE Trans. Smart Grid, 13 (3): 1801-1812 (2022)An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks., , , , , and . IEEE Trans. Intell. Veh., 8 (4): 2998-3011 (April 2023)Bitcoin Gold, Litecoin Silver: An Introduction to Cryptocurrency's Valuation and Trading Strategy., , , and . CoRR, (2023)Quantity-Contingent Auctions and Allocation of Airport Slots., , , and . Transp. Sci., 54 (4): 858-881 (2020)Delving into Discrete Normalizing Flows on SO(3) Manifold for Probabilistic Rotation Modeling., , , , , and . CVPR, page 21264-21273. IEEE, (2023)Study on Indexes Weighting of the Physical Quality of Life Evaluation of Rural Migrant Workers Application of Combined Weighting Method Based on AHP and ANN., , and . ICNC (2), page 172-177. IEEE Computer Society, (2008)Generic 3D Diffusion Adapter Using Controlled Multi-View Editing., , , , , , , and . CoRR, (2024)Predicting Aircraft Trajectories: A Deep Generative Convolutional Recurrent Neural Networks Approach., and . CoRR, (2018)An Unsupervised Detection Approach for Hardware Trojans., , , , , and . IEEE Access, (2020)