Author of the publication

4×96 Gbit/s PAM8 for Short-Reach Applications Employing Low-Cost DML without Pre-Equalization.

, , , , , , , and . OFC, page 1-3. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimation of wetland aboveground biomass based on SAR image: A case study of Honghe National Natural Reserve in Heilongjiang, China., , , and . Geoinformatics, page 1-6. IEEE, (2010)Pm2.5 Prediction In Nanjing Based On Cnn-lstm., , and . CISP-BMEI, page 1-4. IEEE, (2022)Embedding Secret Message in Chinese Characters via Glyph Perturbation and Style Transfer., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Experiment and simulation research of engine cooling fan in dump truck., , , and . EMEIT, page 742-745. IEEE, (2011)Selling mode choice and return policy for advance selling in an e-commerce platform with social influence., , , and . Comput. Ind. Eng., (2024)Distortion-Aware Mutual Constraint for Screen Content Image Quality Assessment., , , and . ICIG (1), volume 14355 of Lecture Notes in Computer Science, page 403-414. Springer, (2023)4×96 Gbit/s PAM8 for Short-Reach Applications Employing Low-Cost DML without Pre-Equalization., , , , , , , and . OFC, page 1-3. IEEE, (2019)Variability of structurally constrained and unconstrained functional connectivity in schizophrenia.. University of Warwick, Coventry, UK, (2016)British Library, EThOS.Robust Adaptive Steganography Based on Adaptive STC-ECC., , , , , and . IEEE Trans. Multim., (2024)CGNet: Detecting computer-generated images based on transfer learning with attention module., , , , , and . Signal Process. Image Commun., (2022)