Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LAI Retrieval Using PROSAIL Model and Optimal Angle Combination of Multi-Angular Data in Wheat., , , and . IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 6 (3): 1730-1736 (2013)DOPdefender: An approach to thwarting data-oriented programming attacks based on a data-aware automaton., , , , and . Comput. Secur., (2019)DOPdefenderPlus: A Data-Oriented Programming Attack Mitigation Technique for Complex Software., , , , and . IEEE Access, (2019)A Survey of Exploitation Techniques and Defenses for Program Data Attacks., , , , and . J. Netw. Comput. Appl., (2020)Research on Security Detection Technology for Internet of Things Terminal Based on Firmware Code Genes., , , , and . IEEE Access, (2020)Analysis of major risks associated with hydrocarbon storage caverns in bedded salt rock., , , , and . Reliab. Eng. Syst. Saf., (2013)Retrieval of leaf area index with PROSAIL model and multi-angle data., , , , and . IGARSS, page 6471-6474. (2012)Unpaired Domain Transfer for Data Augment in Face Recognition., , , , and . IEEE Access, (2020)Bibliometric Analysis of Remote Sensing Research Trend in Crop Growth Monitoring: A Case Study in China., , , , , and . Remote. Sens., 11 (7): 809 (2019)Peer-to-Peer-Based Publish/Subscribe Architecture for Advanced Infrastructure Systems., , and . J. Comput. Civ. Eng., 24 (1): 65-72 (2010)