Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trojan Horse Attack Strategy on Quantum Private Communication., , , and . ISPEC, volume 3903 of Lecture Notes in Computer Science, page 177-186. Springer, (2006)Reconfigurable Sparse Array Synthesis With Phase-Only Control via Consensus-ADMM-Based Sparse Optimization., , , , , and . IEEE Trans. Veh. Technol., 70 (7): 6647-6661 (2021)Bistatic FDA-MIMO radar space-time adaptive processing., , , and . Signal Process., (2019)MSDN: A Multistage Deep Network for Heart-Rate Estimation From Facial Videos., , , , , and . IEEE Trans. Instrum. Meas., (2023)Plant recognition via leaf shape and margin features., , , , , and . Multim. Tools Appl., 78 (19): 27463-27489 (2019)A classification benchmark for Arabic alphabet phonemes with diacritics in deep neural networks., , , , and . Comput. Speech Lang., (2022)A novel facial expression database construction method based on web images., , and . ICIMCS, page 124-127. ACM, (2011)Efficient Large-Scale Image Data Set Exploration: Visual Concept Network and Image Summarization., , , and . MMM (2), volume 6524 of Lecture Notes in Computer Science, page 111-121. Springer, (2011)DCS-Gait: A Class-Level Domain Adaptation Approach for Cross-Scene and Cross-State Gait Recognition Using Wi-Fi CSI., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)A mixed-reality museum tourism framework based on HMD and fisheye camera., , , , , and . VRCAI, page 47-50. ACM, (2016)