Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recognition of warheads by range-profile matching with automatic threshold., and . EURASIP J. Adv. Signal Process., 2024 (1): 28 (December 2024)Vehicular Computation Offloading in UAV-enabled MEC Systems., , , and . CSCWD, page 1071-1076. IEEE, (2022)A study on attention-based LSTM for abnormal behavior recognition with variable pooling., , , , and . Image Vis. Comput., (2021)IoT Malware Classification Based on Lightweight Convolutional Neural Networks., , , and . IEEE Internet Things J., 9 (5): 3770-3783 (2022)Waiting Experience: Optimization of Feedback Mechanism of Voice User Interfaces Based on Time Perception., , , , and . IEEE Access, (2023)Integrated Registration and Occlusion Handling Based on Deep Learning for Augmented-Reality-Assisted Assembly Instruction., , , , and . IEEE Trans. Ind. Informatics, 19 (5): 6825-6835 (May 2023)A3CMal: Generating adversarial samples to force targeted misclassification by reinforcement learning., , , , and . Appl. Soft Comput., (2021)A static Android malicious code detection method based on multi-source fusion., , and . Secur. Commun. Networks, 8 (17): 3238-3246 (2015)Sparse imaging based on SAR complex image domain., , , and . IGARSS, page 945-948. IEEE, (2013)SAR imaging based on Compressed Sensing., , , , and . IGARSS, page 1674-1677. IEEE, (2011)