Author of the publication

Distributed Controllers Seeking AC Optimal Power Flow Solutions Using ADMM.

, , , , and . IEEE Trans. Smart Grid, 9 (5): 4525-4537 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Lightweight Man-Overboard Detection and Tracking Model Using Aerial Images for Maritime Search and Rescue., , and . Remote. Sens., 16 (1): 165 (January 2024)Rayleigh Lidar Signal Denoising Method Combined with WT, EEMD and LOWESS to Improve Retrieval Accuracy., , , , , , , , , and 1 other author(s). Remote. Sens., 14 (14): 3270 (2022)Uncertainty Evaluation on Temperature Detection of Middle Atmosphere by Rayleigh Lidar., , , , , , , , , and . Remote. Sens., 15 (14): 3688 (July 2023)Research on electronic commerce Logistics dispatching routing Optimization method under the background of big data.. ICIIP, page 35:1-35:5. ACM, (2022)AIM 2022 Challenge on Super-Resolution of Compressed Image and Video: Dataset, Methods and Results., , , , , , , , , and 43 other author(s). ECCV Workshops (3), volume 13803 of Lecture Notes in Computer Science, page 174-202. Springer, (2022)Generalized orthogonal moment., , and . CIS, page 35-39. IEEE, (2020)Distributed Controllers Seeking AC Optimal Power Flow Solutions Using ADMM., , , , and . IEEE Trans. Smart Grid, 9 (5): 4525-4537 (2018)Power Efficient Video Super-Resolution on Mobile NPUs with Deep Learning, Mobile AI & AIM 2022 Challenge: Report., , , , , , , , , and 43 other author(s). ECCV Workshops (3), volume 13803 of Lecture Notes in Computer Science, page 130-152. Springer, (2022)Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding., , , and . ICISC (2), volume 14562 of Lecture Notes in Computer Science, page 113-132. Springer, (2023)Registered Attribute-Based Signature., , , , and . Public Key Cryptography (1), volume 14601 of Lecture Notes in Computer Science, page 133-162. Springer, (2024)