Author of the publication

Device-free Human Activity Recognition Based on Random Subspace Classifier Ensemble.

, , and . PIMRC, page 590-591. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HTTP-sCAN: Detecting HTTP-flooding attaCk by modeling multi-features of web browsing behavior from noisy dataset., , , , and . APCC, page 677-682. IEEE, (2013)New Classes of Ternary Bent Functions From the Coulter-Matthews Bent Functions., , and . IEEE Trans. Inf. Theory, 64 (6): 4653-4663 (2018)Local segment-shared protection based on source egress gateway selection for multi-domain optical mesh networks., , , , and . Sci. China Inf. Sci., 54 (2): 227-235 (2011)RMI-DRE: a redundancy-maximizing identification scheme for data redundancy elimination., , , and . Sci. China Inf. Sci., 59 (8): 089301:1-089301:3 (2016)An efficient authentication protocol for low-cost RFID system in the prensence of malicious readers., and . FSKD, page 2111-2114. IEEE, (2012)Time-stamp based mutual authentication protocol for mobile RFID system., , and . WOCC, page 702-706. IEEE, (2013)Analytical results towards fuzzy error bound of indoor neighbor matching based positioning algorithm., , , , and . J. Intell. Fuzzy Syst., 38 (4): 3675-3686 (2020)Features extraction and analysis for device-free human activity recognition based on channel statement information in b5G wireless communications., , , , , and . EURASIP J. Wireless Comm. and Networking, 2020 (1): 36 (2020)Intelligent Vulnerability Analysis for Connectivity and Critical-Area Integrity in IoV., , , , and . IEEE Access, (2020)On Vector Linear Solvability of Multicast Networks., , , , and . IEEE Trans. Commun., 64 (12): 5096-5107 (2016)