Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Unknown Radar Emitter Identification Method Based on Semi-Supervised and Transfer Learning., , , , , and . Algorithms, 12 (12): 271 (2019)A Two-Dimensional Frequency Modulation Deception Jamming Against ISAR., , , , , and . IEEE Access, (2019)A study on blanket noise jamming to LFM pulse compression radar., , , and . ICSPCC, page 1-5. IEEE, (2017)A Wideband Real-Time Deception Jamming Method for Countering ISAR Based on Parallel Convolution., , , , , and . IEICE Trans. Commun., 103-B (5): 609-617 (2020)Focus on discovering mechanisms: a relativistic, agent-directed, perfused liver., , and . SpringSim, SCS/ACM, (2009)On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work., , , and . IACR Cryptol. ePrint Arch., (2020)Fingerprint identification using local Gabor filters., , , , and . NCM, page 626-631. IEEE Computer Society, (2010)Direct Minutiae Matching in Gray-Level Fingerprint Images., , , and . ICICIC (3), page 577-580. IEEE Computer Society, (2006)On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work., , , and . EUROCRYPT (2), volume 12697 of Lecture Notes in Computer Science, page 598-629. Springer, (2021)Connectivity Strategies for Second-Order Rotation Invariant Neural Networks., , , and . Artificial Intelligence and Applications, page 820-824. IASTED/ACTA Press, (2005)