Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Intrusion Detection with Intelligent Network Interfaces for Future Networks., , , and . ICC, page 1-5. IEEE, (2009)Speed feedback control of chaotic system, , , , and . Chaos, Solitons & Fractals, 23 (1): 259--263 (January 2005)Impact of overloading on link-level performance for sparse code multiple access., , , , , and . WOCC, page 1-4. IEEE, (2016)Environmental performance analysis of Chinese industry from a slacks-based perspective., , , and . Ann. Oper. Res., 228 (1): 65-80 (2015)An algorithm implementation for tool wear of HSC.. Int. J. Comput. Appl. Technol., 28 (1): 82-86 (2007)ChainSDI: A Software-Defined Infrastructure for Regulation-Compliant Home-Based Healthcare Services Secured by Blockchains., , , , , , , and . IEEE Syst. J., 14 (2): 2042-2053 (2020)An Ensemble Algorithm for Numerical Solutions to Deterministic and Random Parabolic PDEs., and . SIAM J. Numer. Anal., 56 (2): 859-876 (2018)Foveation-based Mechanisms Alleviate Adversarial Examples., , , , and . CoRR, (2015)Multi-Camera Saliency., , , and . IEEE Trans. Pattern Anal. Mach. Intell., 37 (10): 2057-2070 (2015)Monitoring of Surface Subsidence of the Mining Area Based on SBAS., , , and . J. Comput., 9 (5): 1177-1184 (2014)