Author of the publication

Secure Two-Way Fiber-Optic Time Transfer Against Sub-ns Asymmetric Delay Attack With Clock Model-Based Detection and Mitigation Scheme.

, , , , , , , , , , , , , , , , , and . IEEE Trans. Instrum. Meas., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring scientific prestige of papers with time-aware mutual reinforcement ranking model., , , , , and . J. Intell. Fuzzy Syst., 36 (2): 1505-1519 (2019)3D medical image segmentation based on active contour model., and . BMEI, page 98-102. IEEE, (2012)A novel visual object tracking algorithm using multiple spatial context models and Bayesian Kalman filter., , and . ISCAS, page 1034-1037. IEEE, (2015)The Design and Implementation of a Wireless Data Acquisition/Transmitting System for Euro-balise., , , , and . Journal of Circuits, Systems, and Computers, (2013)Optimization of Blastability Parameters of Ore Rock Based on Multi-source Information Fusion Theory., , , , and . ISCID (1), page 252-255. IEEE, (2017)基于GPU的分子动力学模拟Cell Verlet算法实现及其并行性能分析 (Cell Verlet Algorithm of Molecular Dynamics Simulation Based on GPU and Its Parallel Performance Analysis)., , , and . 计算机科学, 45 (10): 291-294 (2018)Recommendations based on user effective point-of-interest path., , , , , and . Int. J. Machine Learning & Cybernetics, 10 (10): 2887-2899 (2019)A Metadata Update Strategy for Large Directories in Wide-Area File Systems., , , , , and . HPCC/CSS/ICESS, page 400-403. IEEE, (2014)Position-based fluid control., , , and . I3D, page 61-68. ACM, (2015)Minimization of Transformed L1 Penalty: Closed Form Representation and Iterative Thresholding Algorithms., and . CoRR, (2014)