Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Application of Penetration Attack Tree Model Oriented to Attack Resistance Test., , , and . CSSE (3), page 622-626. IEEE Computer Society, (2008)978-0-7695-3336-0.FRR: a proportional and worst-case fair round robin scheduler., and . INFOCOM, page 831-842. IEEE, (2005)Growing Efficient Deep Networks by Structured Continuous Sparsification., , and . CoRR, (2020)From Rank Estimation to Rank Approximation: Rank Residual Constraint for Image Restoration., , , , , and . IEEE Trans. Image Process., (2020)A Message Scheduling Scheme for All-to-All Personalized Communication on Ethernet Switched Clusters., , and . IEEE Trans. Parallel Distributed Syst., 18 (2): 264-276 (2007)Event-triggered receding horizon control via actor-critic design., , and . Sci. China Inf. Sci., (2020)Pairwise-based Multi-Attribute Decision Making Approach for Wireless Network., , , , and . CoRR, (2019)Multi-Path Routing on the Jellyfish Networks., , and . CoRR, (2020)Research on path generation and stability control method for UAV-based intelligent spray painting of ships., , , , , , , , and . J. Field Robotics, 39 (3): 188-202 (2022)Integrated Communication, Sensing, and Computation Framework for 6G Networks., , , , , , and . CoRR, (2023)