Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps., , , and . MobiSys, page 89-103. ACM, (2015)The Research on Consolidated Financial Evaluation about Corporate Social Responsibility Based on Fuzzy-AHP., , and . HIS (3), page 447-450. IEEE Computer Society, (2009)An efficient hybrid multi-objective particle swarm optimization with a multi-objective dichotomy line search., , , , and . J. Comput. Appl. Math., (2015)Distributed Topology Control and Channel Allocation Algorithm for Energy Efficiency in Wireless Sensor Network: From a Game Perspective., , , , and . Wireless Personal Communications, 80 (4): 1557-1577 (2015)Characterization and extraction of building layovers in urban areas using high resolution SAR imagery., , , and . IGARSS, page 895-898. IEEE, (2013)Region-based L0 gradient minimization for PolSAR image segmentation., , , and . IGARSS, page 4344-4347. IEEE, (2015)Multi-temporal superpixel generation for high resolution SAR image analysis., , , , and . IGARSS, page 1686-1689. IEEE, (2014)A Modified Homotopy Method for Nevanlinna-Pick Interpolation with Degree Constraint., , and . ROCOND, page 418-423. International Federation of Automatic Control, (2012)Second-order Taylor expansion for backward doubly stochastic control system., and . Int. J. Control, 86 (5): 942-952 (2013)Search on Security of Wireless Sensor Network in Facilities on Sports Venues., , and . ICAIC (1), volume 224 of Communications in Computer and Information Science, page 418-423. Springer, (2011)