Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal DoS attack scheduling for multi-sensor remote state estimation over interference channels., , and . J. Frankl. Inst., 358 (9): 5136-5162 (2021)Passive source localization using importance sampling based on TOA and FOA measurements., , , , and . Frontiers Inf. Technol. Electron. Eng., 18 (8): 1167-1179 (2017)Structural total least squares algorithm for locating multiple disjoint sources based on AOA/TOA/FOA in the presence of system error., , , , and . Frontiers Inf. Technol. Electron. Eng., 19 (7): 917-936 (2018)Direct position determination based on unitary space-time subspace data fusion., , , and . WCSP, page 1-6. IEEE, (2017)Direct Localization of Multiple Stationary Narrowband Sources Based on Angle and Doppler., , , and . IEEE Communications Letters, 21 (12): 2630-2633 (2017)Systems of natural-language-facilitated human-robot cooperation: A review., and . CoRR, (2017)Algorithmic aspects of topology control problems for ad hoc networks., , , , and . MobiHoc, page 123-134. ACM, (2002)Semantic Location Privacy Protection Based on Privacy Preference for Road Network., , , and . CSS (2), volume 11983 of Lecture Notes in Computer Science, page 330-342. Springer, (2019)UIO-Based Testbed Augmentation for Simulating Cyber-Physical Systems., , , , , and . IEEE Intelligent Systems, 33 (6): 69-86 (2018)Graph Regularized Non-negative Matrix Factorization with Long-tail Constraint., , , and . PACRIM, page 1-5. IEEE, (2019)