Author of the publication

SNR analysis of high-frequency steady-state visual evoked potentials from the foveal and extrafoveal regions of Human Retina.

, , , , , , , , , and . EMBC, page 1810-1814. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Habituation of steady-state visual evoked potentials in response to high-frequency polychromatic foveal visual stimulation., , , , , , , , , and 6 other author(s). EMBC, page 803-806. IEEE, (2013)Optimized rateless UEP codes for scalable video streaming., , , , , and . VCIP, page 1-6. IEEE, (2012)On the optimization of degree distributions in LT code with covariance matrix adaptation evolution strategy., , , and . IEEE Congress on Evolutionary Computation, page 1-8. IEEE, (2010)Trusted worthy Fog Computing testbed developed in Great China Region., , , , , , , , , and 2 other author(s). FWC, page 1-6. IEEE, (2017)An fMRI study of abrupt-awake episodes during behavioral microsleeps., , , , and . EMBC, page 5060-5063. IEEE, (2011)SNR analysis of high-frequency steady-state visual evoked potentials from the foveal and extrafoveal regions of Human Retina., , , , , , , , , and . EMBC, page 1810-1814. IEEE, (2012)Off-Chain Trusted Computing., , and . IEEE Internet Things Mag., 3 (2): 8-9 (2020)Optimizing degree distributions in LT codes by using the multiobjective evolutionary algorithm based on decomposition., , , and . IEEE Congress on Evolutionary Computation, page 1-8. IEEE, (2010)An error-floor reduction technique for short-length LT codes., , and . ISITA, page 279-283. IEEE, (2014)Efficient authentication of resource-constrained IoT devices based on ECQV implicit certificates and datagram transport layer security protocol., , and . SoICT, page 173-179. ACM, (2016)