Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NFC Payment Spy: A Privacy Attack on Contactless Payments., , , and . SSR, volume 10074 of Lecture Notes in Computer Science, page 92-111. Springer, (2016)The key technologies to implement geographical marker on 3D geoglobe platform., and . IGARSS, page 3983-3986. IEEE, (2010)Diversity Backpressure Scheduling and Routing with Mutual Information Accumulation in Wireless Ad-hoc Networks, and . CoRR, (2013)Design of an ocean current roaming underwater robot., and . ICSAI, page 229-233. IEEE, (2017)An efficient hardware architecture of the optimised SIFT descriptor generation., , , and . FPL, page 345-352. IEEE, (2012)Cross-layer iterative decoding of irregular LDPC codes using cyclic redundancy check codes., , , , and . WCNC, page 942-947. IEEE, (2009)Diversity Backpressure Scheduling and Routing With Mutual Information Accumulation in Wireless Ad-Hoc Networks., and . IEEE Trans. Inf. Theory, 62 (12): 7299-7323 (2016)Recognition of a Phase-Sensitivity OTDR Sensing System Based on Morphologic Feature Extraction., , , and . Sensors, 15 (7): 15179-15197 (2015)Continuous Speech Recognition Based on ICA and Geometrical Learning., , and . ICMLC, volume 3930 of Lecture Notes in Computer Science, page 974-983. Springer, (2005)Image segmentation with hierarchical topic assignment., and . ICIP, page 2125-2128. IEEE, (2011)