Author of the publication

Research of Tool State Recognition Based on CEEMD-WPT.

, , , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 59-70. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research of Tool State Recognition Based on CEEMD-WPT., , , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 59-70. Springer, (2018)Composite Structure Health Monitoring Review Based on FBG Sensor., , and . ICCCS (5), volume 11067 of Lecture Notes in Computer Science, page 171-179. Springer, (2018)New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks., , , and . Pairing, volume 6487 of Lecture Notes in Computer Science, page 327-346. Springer, (2010)Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol., , , and . IEEE Commun. Lett., 12 (2): 149-151 (2008)Real-time Obstacle Avoidance Strategy for Mobile Robot Based On Improved Coordinating Potential Field with Genetic Algorithm., , and . CCA, page 415-419. IEEE, (2007)Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation., , , , and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 493-502. Springer, (2009)AODV协议在渔船超短波自组网中的仿真与分析 (Simulation and Analysis of AODV Protocol in Fishing Marine VHF Ad Hoc Network)., , , and . 计算机科学, 43 (Z6): 285-287 (2016)Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (1): 70-88 (2012)Combining multiple spatial hidden Markov models in image semantic classification and annotation., and . ICPR, page 1-4. IEEE Computer Society, (2008)Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys., , , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 198-203. Springer, (2005)