Author of the publication

A Method and Realization of On-orbit Temperature Phase Compensation for GEOSAR System.

, , , , , and . EITCE, page 1556-1561. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps., , , and . MobiSys, page 89-103. ACM, (2015)The Research on Consolidated Financial Evaluation about Corporate Social Responsibility Based on Fuzzy-AHP., , and . HIS (3), page 447-450. IEEE Computer Society, (2009)Privacy Preserving on Updated Parameters in Federated Learning., , , and . ACM TUR-C, page 27-31. ACM, (2020)SACK2: effective SYN flood detection against skillful spoofs., , and . IET Inf. Secur., 6 (3): 149-156 (2012)Impulsive Networked Control for Discrete-time Delayed Systems., , and . ADHS, volume 45 of IFAC Proceedings Volumes, page 192-197. Elsevier, (2012)Experience on Applying Push Model to Packet Processors in High Performance Routers., , , , , and . GLOBECOM, page 1-5. IEEE, (2010)Improving the throughput and delay performance of network processors by applying push model., , , , , and . IWQoS, page 1-4. IEEE, (2012)Dhff: Robust Multi-Scale Person Search by Dynamic Hierarchical Feature Fusion., , , , and . ICIP, page 3935-3939. IEEE, (2019)Detection of collaborative SSDF attacks using abnormality detection algorithm in cognitive radio networks., , and . ICC Workshops, page 342-346. IEEE, (2013)TCAM-based distributed parallel packet classification algorithm with range-matching solution., , , and . INFOCOM, page 293-303. IEEE, (2005)