Author of the publication

Research on cooperative UAV countermeasure strategy based on interception triangle.

, , , , and . ICMLCA, page 1015-1020. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacking Adaptive Cuckoo Filters: Too Much Adaptation Can Kill You., , , , and . IEEE Trans. Netw. Serv. Manag., 19 (4): 5224-5236 (December 2022)Algorithm for diabetic retinal image analysis based on deep learning., , , , and . Multim. Tools Appl., 82 (30): 47559-47584 (December 2023)No reference stereo video quality assessment based on motion feature in tensor decomposition domain., , , , , and . J. Vis. Commun. Image Represent., (2018)A practical technique to solve settlements overlapping roads problem in map generalization., , , and . Geoinformatics, page 1-5. IEEE, (2015)Study on Data Mining Technology for Online and Offline E-Commerce Users Based on Big Data., and . ICCCS, page 1136-1141. IEEE, (2023)Open-Set Recognition with Dual Probability Learning., and . ICONIP (3), volume 13110 of Lecture Notes in Computer Science, page 127-137. Springer, (2021)Novel technique for P-hit single-event transient mitigation using enhance dummy transistor., , , , and . ISQED, page 243-249. IEEE, (2015)LD-UNet: A long-distance perceptual model for segmentation of blurred boundaries in medical images., , , , , , , and . Comput. Biol. Medicine, (2024)Fault Secure Encoder and Decoder Designs for Matrix Codes., , , and . CAD/Graphics, page 181-185. IEEE, (2015)A Chosen-Plaintext Method of CPA on SM4 Block Cipher., , , , , and . CIS, page 363-366. IEEE Computer Society, (2014)