Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A trust routing protocol based on D-S evidence theory in mobile ad hoc network., , , and . ICCC, page 786-790. IEEE, (2014)Transmit signal design for optimal deconvolution., and . ICASSP (2), page 553-556. IEEE, (2004)The Influence of Time-delay for the Bifurcation of the Fractional Neuron Network., , , and . ICSAI, page 821-826. IEEE, (2019)Implementation of Universal Health Management and Monitoring System in Resource-Constrained Environment Based on Internet of Things., and . IEEE Access, (2021)Improved stability criteria for uncertain linear systems with interval time-varying delay., , and . J. Systems Science & Complexity, 26 (2): 175-186 (2013)AvatarVerse: High-quality & Stable 3D Avatar Creation from Text and Pose., , , , , , , , , and . CoRR, (2023)Dynamic Reconfiguration Algorithm: Dynamically Tuning Multiple Buffer Pools., , , , and . DEXA, volume 1873 of Lecture Notes in Computer Science, page 92-101. Springer, (2000)Textbook Extended on CD., , and . Intelligent Tutoring Media, 5 (3-4): 139-149 (1994)POP and PUSH: Demystifying and Defending against (Mach) Port-oriented Programming., , , , and . NDSS, The Internet Society, (2021)Enpublic Apps: Security Threats Using iOS Enterprise and Developer Certificates., , , , and . AsiaCCS, page 463-474. ACM, (2015)