Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Real-Time Multi-Stage Architecture for Pose Estimation of Zebrafish Head with Convolutional Neural Networks., , , and . J. Comput. Sci. Technol., 36 (2): 434-444 (2021)The Actual Nature of Light (Ⅰ) Reveal the Mystery about the Actual Nature of Light from Newton, Einstein to the Recent Mistakes., , , , and . J. Quantum Information Science, 1 (2): 54-60 (2011)Joint Power Scheduling and Estimator Design for Sensor Networks Across Parallel Channels., , and . ICC, page 4381-4385. IEEE, (2008)On the energy-delay trade-off of a two-way relay network., and . CISS, page 865-870. IEEE, (2008)Open-sector rapid-reactive collision avoidance: Application in aerial robot navigation through outdoor unstructured environments., , , and . Robotics Auton. Syst., (2019)A coarse-to-fine scene text detection method based on Skeleton-cut detector and Binary-Tree-Search based rectification., , and . Pattern Recognit. Lett., (2018)Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay., and . IEEE Trans. Inf. Theory, 59 (1): 177-192 (2013)Providing Secrecy With Structured Codes: Two-User Gaussian Channels., and . IEEE Trans. Inf. Theory, 60 (4): 2121-2138 (2014)The Gaussian Many-to-1 Interference Channel with Confidential Messages, and . CoRR, (2010)Cooperation with an Untrusted Relay: A Secrecy Perspective, and . CoRR, (2009)