Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tracking system of motion object for scout robot., , , and . ROBIO, page 1111-1116. IEEE, (2008)Real-Valued Backpropagation is Unsuitable for Complex-Valued Neural Networks., , , and . NeurIPS, (2022)Low-complexity Neural Network-based MIMO Detector using Permuted Diagonal Matrix., , , , and . ACSSC, page 111-115. IEEE, (2020)An Attack-Resistant Weighted Least Squares Localization Algorithm Based on RSSI., , , , and . SmartCity360°, volume 372 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 476-494. Springer, (2020)Nuwa: A Receiver-driven Congestion Control Framework to Achieve High-throughput and Controlled Delay over Dynamic Wireless Networks., , , , , and . ICPADS, page 147-154. IEEE, (2022)Tamper Detection of Electronic Bills Based on Semi-fragile Watermarking., , and . ICMIP, page 41-44. IEEE, (2016)Principle of Image Encrypting Algorithm Based on Magic Cube Transformation., , , , , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 977-982. Springer, (2005)A User Intent Recognition Model for Medical Queries Based on Attentional Interaction and Focal Loss Boost., , , , , and . NCAA (2), volume 1870 of Communications in Computer and Information Science, page 245-259. Springer, (2023)A fast and efficient correction technique for slant images., , and . ICIGP, page 94-97. ACM, (2019)Stability-constrained optimization for energy efficiency in polling-based wireless networks., and . VALUETOOLS, volume 180 of ACM International Conference Proceeding Series, page 23. ACM, (2006)