Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps., , , and . MobiSys, page 89-103. ACM, (2015)The Research on Consolidated Financial Evaluation about Corporate Social Responsibility Based on Fuzzy-AHP., , and . HIS (3), page 447-450. IEEE Computer Society, (2009)Modeling and prediction of highway traffic flow based on wavelet neural network., and . ICMLC, page 675-679. IEEE, (2014)Search on Security of Wireless Sensor Network in Facilities on Sports Venues., , and . ICAIC (1), volume 224 of Communications in Computer and Information Science, page 418-423. Springer, (2011)Distributed Topology Control and Channel Allocation Algorithm for Energy Efficiency in Wireless Sensor Network: From a Game Perspective., , , , and . Wireless Personal Communications, 80 (4): 1557-1577 (2015)Second-order Taylor expansion for backward doubly stochastic control system., and . Int. J. Control, 86 (5): 942-952 (2013)Characterization and extraction of building layovers in urban areas using high resolution SAR imagery., , , and . IGARSS, page 895-898. IEEE, (2013)Multi-temporal superpixel generation for high resolution SAR image analysis., , , , and . IGARSS, page 1686-1689. IEEE, (2014)Region-based L0 gradient minimization for PolSAR image segmentation., , , and . IGARSS, page 4344-4347. IEEE, (2015)An inventory model with constrained newsboy under renting-warehouse., , and . SMC (7), page 6015-6020. IEEE, (2004)