Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Method of Power Network Security Analysis Considering Cascading Trip., , , , and . ICGEC, volume 1107 of Advances in Intelligent Systems and Computing, page 171-180. Springer, (2019)A Method to Prevent Cascading Trip in Power Network Based on Nodal Power., , , , and . ICGEC, volume 1107 of Advances in Intelligent Systems and Computing, page 302-309. Springer, (2019)Integration over polytopes (abstract only)., and . ACM Conference on Computer Science, page 422. ACM, (1985)Instance-wise points-to analysis for loop-based dependence testing., , , and . ICS, page 262-273. ACM, (2002)Modelling and Analysis of Network Security - an Algebraic Approach., , and . CoRR, (2015)High-Performance SAR Image Matching Using Improved SIFT Framework Based on Rolling Guidance Filter and ROEWA-Powered Feature., , , , and . IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 12 (3): 920-933 (2019)A Location Privacy Preserving Method Based on Sensitive Diversity for LBS., , , , and . NPC, volume 8707 of Lecture Notes in Computer Science, page 409-422. Springer, (2014)Position-Based User-Centric Radio Resource Management in 5G UDN for Ultra-Reliable and Low-Latency Vehicular Communications., , , and . ICC Workshops, page 1-6. IEEE, (2019)3D Modeling and Analysis of Cooperative Perception-Oriented Millimeter-Wave V2I Networks With Information Value-Based Relay., , , , , and . IEEE Trans. Veh. Technol., 72 (8): 10505-10520 (August 2023)Consistency analysis and priority weights of multiplicative trapezoidal fuzzy preference relations based on multiplicative consistency and logarithmic least square model., , , and . J. Intell. Fuzzy Syst., 37 (6): 8317-8334 (2019)