Author of the publication

A Beamformer Based on Sparse Array with Various Array Structures.

, , , and . CSPS, volume 463 of Lecture Notes in Electrical Engineering, page 2182-2189. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Back-Propagation Neural Network for Traffic Incident Detection Based on Fusion of Loop Detector and Probe Vehicle Data., , , , , and . ICNC (3), page 116-120. IEEE Computer Society, (2008)Edge-Isoperimetric Inequalities and Ball-Noise Stability: Linear Programming and Probabilistic Approaches.. CoRR, (2020)The SYSU system for the interspeech 2015 automatic speaker verification spoofing and countermeasures challenge., , , , , , , and . APSIPA, page 152-155. IEEE, (2015)A study on cross-language text summarization using supervised methods., and . NLPKE, page 1-7. IEEE, (2009)FuncNet: A Euclidean Embedding Approach for Lightweight Cross-platform Binary Recognition., , , and . SecureComm (1), volume 304 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 319-337. Springer, (2019)Multilevel Thresholding Method Based on Normalized Cut., , and . Int. J. Image Graph., 9 (4): 531-540 (2009)Redundancy based feature selection for microarray data., and . KDD, page 737-742. ACM, (2004)Rényi Resolvability and Its Applications to the Wiretap Channel., and . IEEE Trans. Inf. Theory, 65 (3): 1862-1897 (2019)Joint Source-Channel Secrecy Using Uncoded Schemes: Towards Secure Source Broadcast., , and . IEEE Trans. Inf. Theory, 63 (11): 7442-7463 (2017)Odd Induced Subgraphs in Graphs with Treewidth at Most Two., , , and . Graphs Comb., 34 (4): 535-544 (2018)