Author of the publication

Highly Contaminated Work Mode Identification of Phased Array Radar Using Deep Learning Method.

, , , , and . IGARSS, page 2759-2762. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A universal programmable Gaussian boson sampler for drug discovery., , , , , , , , , and 14 other author(s). Nat. Comput. Sci., 3 (10): 839-848 (2023)Expressing Business Rules in BPMN., and . ICEIS (3-1), page 266-270. (2008)A new butterfly-shaped attractor of Lorenz-like system, , , and . Chaos, Solitons & Fractals, 28 (5): 1196--1203 (June 2006)Energy Optimization Algorithm of Wireless Sensor Networks based on LEACH-B., , , and . 3PGCIC, volume 1 of Lecture Notes on Data Engineering and Communications Technologies, page 391-404. Springer, (2016)A Bayes Classifier-Based OVFDT Algorithm for Massive Stream Data Mining on Big Data Platform., , , and . CISIS, volume 611 of Advances in Intelligent Systems and Computing, page 537-546. Springer, (2017)Distributed Iterative Detection Based on Reduced Message Passing for Networked MIMO Cellular Systems., and . CoRR, (2014)A Projective Integration Method for Transient Stability Assessment of Power Systems With a High Penetration of Distributed Generation., , , , and . IEEE Trans. Smart Grid, 9 (1): 386-395 (2018)Energy Management for EV Charging in Software-Defined Green Vehicle-to-Grid Network., , , , , and . IEEE Communications Magazine, 56 (5): 156-163 (2018)Unicast and Broadcast Throughput Maximization in Amplify-and-Forward Relay Networks., , , and . IEEE Trans. Vehicular Technology, 61 (6): 2768-2776 (2012)Light-Weight and Privacy-Preserving Authentication Protocol for Mobile Payments in the Context of IoT., , , and . IEEE Access, (2019)