Author of the publication

RC6D: An RFID and CV Fusion System for Real-time 6D Object Pose Estimation.

, , , , , and . INFOCOM, page 690-699. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Identification of Multi-Tagged Objects for Large-Scale RFID Systems., , , and . IEEE Wirel. Commun. Lett., 8 (4): 992-995 (2019)HaarAE: an unsupervised anomaly detection model for IOT devices based on Haar wavelet transform., , , , and . Appl. Intell., 53 (15): 18125-18137 (August 2023)An improved spatial-temporal correlation algorithm combined with compressed sensing and LEACH protocol in WSNs., , , , and . Int. J. Inf. Comput. Secur., 12 (4): 383-396 (2020)Determination of Meteor Vector Velocity Using MU Interferometry Measurements of Head Echoes., , , , and . Remote. Sens., 15 (15): 3784 (August 2023)Dynamic Resource Allocation for 5G-Enabled Industrial Internet of Things System with Delay Tolerance., , and . VTC Fall, page 1-6. IEEE, (2022)Data sharing scheme for 5G IoT based on blockchain., , , and . IWCMC, page 327-329. IEEE, (2021)Joint Power Control for Over-the-Air Computation in Multicarrier Wireless System., , and . GLOBECOM, page 794-799. IEEE, (2022)Protect Privacy from Gradient Leakage Attack in Federated Learning., , , and . INFOCOM, page 580-589. IEEE, (2022)AZ-Code: An Efficient Availability Zone Level Erasure Code to Provide High Fault Tolerance in Cloud Storage Systems., , , , , , , , and . MSST, page 230-243. IEEE, (2019)An Intrusion Detection Method Based on Hierarchical Feature Learning and Its Application., , , , , and . CSS (1), volume 11982 of Lecture Notes in Computer Science, page 13-20. Springer, (2019)