Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Over-Voltage Suppression Methods for the MMC-VSC-HVDC Wind Farm Integration System., , , , , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 67-II (2): 355-359 (2020)An ontology-based approach for supply-chain quality control: From a principal-agent perspective., , , , and . J. Inf. Sci., (2019)A mobile malware detection method using behavior features in network traffic., , , , , and . J. Netw. Comput. Appl., (2019)A Coarse-to-Fine Deformable Transformation Framework for Unsupervised Multi-Contrast MR Image Registration with Dual Consistency Constraint., , , , , , , and . IEEE Trans. Medical Imaging, 40 (10): 2589-2599 (2021)Assessment of Grassland Degradation on the Tibetan Plateau Based on Multi-Source Data., , , , , , and . Remote. Sens., 14 (23): 6011 (December 2022)Impact of Indoor Distributed Antenna System on RF-EMF Global Exposure., , and . IEEE Access, (2023)Coherence Factor-Like Beamforming for Ultrasound Computed Tomography., , , , , and . J. Medical Imaging Health Informatics, 10 (3): 672-676 (2020)An Identification Algorithm of Rice Seedling Rows with Seedlings Absence Based on CS-Yolov5 Model., and . RSAE, page 41-48. ACM, (2023)The Interaction Between the Choice of Currency Settlement and RMB Monetary policy., and . IC4E, page 595-604. ACM, (2022)Adversarial Attack with Genetic Algorithm against IoT Malware Detectors., , , , , , and . ICC, page 1413-1418. IEEE, (2023)