Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Failure Detection Framework for Stochastic Discrete Event Systems With Guaranteed Error Bounds., and . IEEE Trans. Automat. Contr., 60 (6): 1542-1553 (2015)Person re-identification with content and context re-ranking., , , , and . Multimedia Tools Appl., 74 (17): 6989-7014 (2015)A novel radar radiation control strategy based on passive tracking in multiple aircraft platforms., , , and . ChinaSIP, page 777-780. IEEE, (2014)Benefit-Cost Analysis of Security Systems for Multiple Protected Assets Based on Information Entropy., , , and . Entropy, 14 (3): 571-580 (2012)A Secchi Depth Algorithm Considering the Residual Error in Satellite Remote Sensing Reflectance Data., , , and . Remote Sensing, 11 (16): 1948 (2019)Out-of-Stock Detection Based on Deep Learning., , and . ICIC (1), volume 11643 of Lecture Notes in Computer Science, page 228-237. Springer, (2019)Hierarchical Energy Optimization With More Realistic Power Consumption and Interference Models for Ultra-Dense Networks., , and . IEEE Trans. Wirel. Commun., 19 (7): 4507-4518 (2020)One-Shot Face Recognition with Feature Rectification via Adversarial Learning., , , and . MMM (1), volume 11961 of Lecture Notes in Computer Science, page 290-302. Springer, (2020)A Maximin Optimal Online Power Control Policy for Energy Harvesting Communications., and . ICC, page 1-6. IEEE, (2020)Asynchronous Slepian-Wolf code design., , , and . ISIT, page 869-873. IEEE, (2009)