Author of the publication

Target-Acquisition-Performance-Model-Based Quality Metric for Multisensor Image Fusion.

, , , and . CIS, page 398-400. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Hybrid Wavelet Regularization Method for Compressive Imaging., , and . ICCCS (2), volume 10603 of Lecture Notes in Computer Science, page 461-470. Springer, (2017)Pedestrian dead reckoning trajectory matching method for radio map crowdsourcing building in WiFi indoor positioning system., , , and . ICC, page 1-6. IEEE, (2017)Hilbert Transform Based Time-of-Flight Estimation of Multi-Echo Ultrasonic Signals and Its Resolution Analysis., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (9): 1962-1965 (2014)A Generic Conversion with Optimal Redundancy., , and . CT-RSA, volume 3376 of Lecture Notes in Computer Science, page 104-117. Springer, (2005)Tag-KEM from Set Partial Domain One-Way Permutations., , , and . ACISP, volume 4058 of Lecture Notes in Computer Science, page 360-370. Springer, (2006)Practical Searching over Encrypted Data by Private Information Retrieval., , , , , and . GLOBECOM, page 1-5. IEEE, (2010)Optimal Guaranteed Cost Sliding Mode Control for Constrained-Input Nonlinear Systems With Matched and Unmatched Disturbances., , , and . IEEE Trans. Neural Networks Learn. Syst., 29 (6): 2112-2126 (2018)A Smart Home Architecture Based on Resource Name Service., , , , and . CSE, page 1915-1920. IEEE Computer Society, (2014)A Lattice-Based Anonymous Authentication for Privacy Protection of Medical Data., , and . DMBD (2), volume 1454 of Communications in Computer and Information Science, page 228-238. Springer, (2021)Certificateless Proxy Authentication Scheme on Lattices Under the Background of Big Data., , and . DMBD (2), volume 1454 of Communications in Computer and Information Science, page 185-193. Springer, (2021)