Author of the publication

Fabrication of InP-based monolithically integrated laser transmitters.

, , , , , , and . Sci. China Inf. Sci., 61 (8): 080405:1-080405:19 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A rational delegating computation protocol based on reputation and smart contract., , , , and . J. Cloud Comput., 10 (1): 51 (2021)Multimodal Feature-Level Fusion for Biometrics Identification System on IoMT Platform., , , , , , , and . IEEE Access, (2018)Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks., , , , and . Int. J. Distributed Sens. Networks, (2018)N-LoLiGan: Unsupervised low-light enhancement GAN with an N-Net for low-light tunnel images., , , , , , , and . Digit. Signal Process., (November 2023)An Integrative System for Deep Packet Inspection and Network Anomaly Detection amp; Defense, , , , and . Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on, page 1-4. (2011)New asymptotical stability conditions for delayed neural networks model with distribution., , , and . ICNC, page 782-784. IEEE, (2010)Dark Area Classification From Airborne SAR Images Based on Deep Margin Learning.. IEEE Access, (2021)LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection., , , , , , , and . IEEE Access, (2019)Security Protocol for RFID System Conforming to EPC-C1G2 Standard., , , , and . J. Comput., 8 (3): 605-612 (2013)Based on the character of cloud storage string encryption and cipher text retrieval of string research., , , and . CCIS, page 409-413. IEEE, (2016)