Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image recovery and recognition: a combining method of matrix norm regularisation., , , , and . IET Image Process., 13 (8): 1246-1253 (2019)A Secure Localization Algorithm Based on Confidence Constraint for Underwater Wireless Sensor Networks., , , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 46-49. Springer, (2017)The general theory for response analysis of fuzzy stochastic dynamical systems., , and . Fuzzy Sets Syst., 83 (3): 369-405 (1996)Frequency domain methods for the solutions of N-order fuzzy differential equations., , and . Fuzzy Sets Syst., 94 (1): 45-59 (1998)Deep learning driven real time topology optimisation based on initial stress learning., , , , , , and . Adv. Eng. Informatics, (2022)Efficient secret key generation scheme of physical layer security communication in ubiquitous wireless networks., , , , , , , and . IET Commun., 15 (8): 1123-1132 (2021)Attention-guided dynamic multi-branch neural network for underwater image enhancement., , , , and . Knowl. Based Syst., (2022)Research on Multi-disciplinary Integrated Design Method of Remote Sensing Satellites., , and . CSDM Asia / CSDM, page 491. Springer, (2021)Discriminative Topic Mining via Category-Name Guided Text Embedding., , , , , , and . WWW, page 2121-2132. ACM / IW3C2, (2020)A self-stabilizing protocol for minimal weighted dominating sets in arbitrary networks., , , and . CSCWD, page 496-501. IEEE, (2013)