Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Automated Test Suite Generating Approach for Stateful Web Services., , and . SATE, volume 11293 of Lecture Notes in Computer Science, page 185-201. Springer, (2018)A Software Reliability Test Suite Generating Approach Based on Hybrid Model for Complex Equipment System., , and . DSA, page 144-154. IEEE, (2017)Parametric Software Defect Patterns Based on Test Perspective., , and . DSA, page 364-370. IEEE, (2020)A Novel Sense-through-Foliage Target Recognition Method Based on Sparse Representation., , and . MILCOM, page 1628-1633. IEEE, (2013)A new admission control scheme for the overlapping BSS issues in the 802.11 WLANS., and . ISCIT, page 583-587. IEEE, (2014)Dynamic body postures recognition with WiFi based on empirical mode decomposition (EMD)., and . ISCIT, page 1-5. IEEE, (2017)An effective way to integrate ε-support vector regression with gradients., and . Expert Syst. Appl., (2018)A method of obstacle identification in ultra wideband wireless sensor networks., and . Int. J. Sens. Networks, 17 (1): 63-72 (2015)Safeguarding multiuser communication using full-duplex jamming and Q-learning algorithm., , and . IET Commun., 12 (15): 1805-1811 (2018)Physical-layer security in Internet of Things based on compressed sensing and frequency selection., , , and . IET Commun., 11 (9): 1431-1437 (2017)