Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiple Attacks Detection in Cyber-Physical Systems Using Random Finite Set Theory., , , , and . IEEE Trans. Cybern., 50 (9): 4066-4075 (2020)Hide Your Model: A Parameter Transmission-free Federated Recommender System., , , , , and . CoRR, (2023)Risk-Aware Leakage Resiliency for Wireless Sensor Network Nodes., , , and . CIS, page 282-286. IEEE Computer Society, (2017)Waveform Design For Track-Before-Detect-Based Cognitive Radars., , , and . SAM, page 1-5. IEEE, (2020)Dual-Polarimetric Persymmetric Adaptive Subspace Detector for Range-Spread Targets in Heavy-Tailed Non-Gaussian Clutter., , , and . IEEE Geosci. Remote. Sens. Lett., (2023)Augmented Labeled Random Finite Sets and Its Application to Group Target Tracking., , , , and . CoRR, (2024)Semantic Similarity Computation in Knowledge Graphs: Comparisons and Improvements., , , and . ICDE Workshops, page 249-252. IEEE, (2019)A Surveillance System for Drone Localization and Tracking Using Acoustic Arrays., , , , and . SAM, page 573-577. IEEE, (2018)A Benchmarking Evaluation of Graph Neural Networks on Traffic Speed Prediction., , , , , and . ADMA (1), volume 13725 of Lecture Notes in Computer Science, page 472-488. Springer, (2022)An Algorithm for GPS Spoofing Detection and Positioning Recovery., , and . IECON, page 1-6. IEEE, (2022)