Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Berth-Crane Allocation Model and Algorithm of Container Berths in the Uncertain Environment., , , and . BIC-TA, volume 212 of Advances in Intelligent Systems and Computing, page 785-792. Springer, (2013)Solvent Engineering for Ambient-Air-Processed, Phase-Stable CsPbI3 in Perovskite Solar Cells, , , , , , and . The Journal of Physical Chemistry Letters, 0 (0): 3603-3608 (0)PMID: 27569604.Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys., , , and . Comput. J., 62 (8): 1087-1091 (2019)基于改进分层任务网的指控行为模型 (Command and Control Behavior Model Based on Improved Hierarchical Task Network)., , and . 计算机科学, 44 (Z6): 519-522 (2017)Decisions Tree Learning Method Based on Three-Way Decisions., , , and . RSFDGrC, volume 9437 of Lecture Notes in Computer Science, page 389-400. Springer, (2015)Filtered Multitone Modulation Underwater Acoustic Communications Using Low-Complexity Channel-Estimation-Based MMSE Turbo Equalization., , , , and . Sensors, 19 (12): 2714 (2019)Control of an extending nonlinear elastic cable with an active vibration control strategy., , and . Commun. Nonlinear Sci. Numer. Simul., 19 (10): 3901-3912 (2014)Online Condition Monitoring for Bond Wire Degradation of IGBT Modules in Three-Level Neutral-Point-Clamped Converters., , , , and . IEEE Trans. Ind. Electron., 68 (8): 7474-7484 (2021)Mining Customer Preference in Physical Stores From Interaction Behavior., , , , and . IEEE Access, (2017)Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols., and . IACR Cryptology ePrint Archive, (2013)