Author of the publication

A Relationship Between Time-Reversal Imaging and Maximum-Likelihood Scattering Estimation.

, and . IEEE Trans. Signal Process., 55 (9): 4707-4711 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correct and Crisp Edge Detection Approach Based on Dense Network., , , , and . IEEE Access, (2023)Secure Mobile Payment Employing Trusted Computing on TrustZone Enabled Platforms., , , and . Trustcom/BigDataSE/ISPA, page 1944-1950. IEEE, (2016)A Method of Personnel Location Based on Monocular Camera in Complex Terrain., , , , and . CCBR, volume 10996 of Lecture Notes in Computer Science, page 175-185. Springer, (2018)Dam: A Practical Scheme to Mitigate Data-Oriented Attacks with Tagged Memory Based on Hardware., , and . APSEC, page 204-211. IEEE, (2019)Recognition of hemodynamic responses for mental arithmetic using support vector machine., , , , and . ROBIO, page 1024-1029. IEEE, (2013)A Relationship Between Time-Reversal Imaging and Maximum-Likelihood Scattering Estimation., and . IEEE Trans. Signal Process., 55 (9): 4707-4711 (2007)Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing., , , , , , , and . Cybersecur., 1 (1): 2 (2018)BERT-Based Vulnerability Type Identification with Effective Program Representation., , , , , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 271-282. Springer, (2022)An Effective Buffer Overflow Detection With Super Data-Flow Graphs., , , and . ISPA/BDCloud/SocialCom/SustainCom, page 684-691. IEEE, (2022)BHMVD: Binary Code-based Hybrid Neural Network for Multiclass Vulnerability Detection., , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 238-245. IEEE, (2022)