Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Insider Threat Detection Based on User Historical Behavior and Attention Mechanism., , , , , and . DSC, page 564-569. IEEE, (2021)Sensitive Image Information Recognition Model of Network Community based on Content Text., , , , , and . DSC, page 47-52. IEEE, (2021)Cooperative Calibration Scheme for Mobile Wireless Sensor Network., , , , and . MSN, page 143-150. IEEE, (2019)A CSI Frequency Domain Fingerprint-Based Method for Passive Indoor Human Detection., , , , and . TrustCom/BigDataSE, page 1832-1837. IEEE, (2018)Attention-based video object segmentation algorithm., , , and . IET Image Process., 15 (8): 1668-1678 (2021)An energy-saving strategy based on sleep scheduling and block transmission for wireless multimedia sensor networks., , , and . Int. J. Pervasive Comput. Commun., 6 (2): 248-267 (2010)Routing Strategy for LEO Satellite Networks Based on Membership Degree Functions., , , , and . Secur. Commun. Networks, (2020)TWLBR: Multi-Human Through-Wall Localization and Behavior Recognition Based on MIMO Radar., , , , and . GLOBECOM, page 3186-3191. IEEE, (2022)Mining frequent itemsets in data streams based on genetic algorithm., , , and . ICCT, page 748-753. IEEE, (2013)IIS-FVIQA: Finger Vein Image Quality Assessment with intra-class and inter-class similarity., , , , and . Pattern Recognit., (2025)