Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gridless sparse recovery methods for DLSLA 3-D SAR crosstrack reconstruction., , , , , , and . IGARSS, page 3234-3237. IEEE, (2016)First-Person Daily Activity Recognition With Manipulated Object Proposals and Non-Linear Feature Fusion., , , , , and . IEEE Trans. Circuits Syst. Video Techn., 28 (10): 2946-2955 (2018)An efficient traceable data sharing scheme in cloud computing for mobile devices., , and . IJHPCN, 12 (2): 156-165 (2018)An Associated Deletion Scheme for Multi-copy in Cloud Storage., , , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 511-526. Springer, (2018)An Effective Cloud-Based Active Defense System against Malicious Codes., , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 690-695. Springer, (2014)The chromatic equivalence class of graph ‾Bn-6, 12., , , and . Discussiones Mathematicae Graph Theory, 28 (2): 189-218 (2008)Receiver design for OFDM-CDMA systems with multiplexed STBC., , and . PIMRC, page 2420-2424. IEEE, (2005)Spatial Compression for Fronthaul-Constrained Uplink Receiver in 5G Systems., , , and . WCNC, page 1-6. IEEE, (2019)A new expression for the adjoint polynomial of a path., , , , and . Australas. J Comb., (2009)Applications, challenges, and prospective in emerging body area networking technologies., and . IEEE Wirel. Commun., 17 (1): 80-88 (2010)