Author of the publication

A Data Streaming Algorithm for Detection of Superpoints With Small Memory Consumption.

, , , , , and . IEEE Communications Letters, 21 (5): 1067-1070 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achieving High Precision RFID Trajectory Tracing with Kinematic Features., , , and . Ad Hoc Sens. Wirel. Networks, 41 (1-2): 55-81 (2018)Sub-word attention mechanism and ensemble learning-based semantic annotation for heterogeneous networks., , , , , , and . Int. J. Wirel. Mob. Comput., 18 (1): 51-58 (2020)Revisiting spectral clustering for near-convex decomposition of 2D shape., , , , and . Pattern Recognit., (2020)An in-depth survey on Deep Learning-based Motor Imagery Electroencephalogram (EEG) classification., , , , and . Artif. Intell. Medicine, (January 2024)Temporal Index Scheme of Hyperledger Fabric System in IoT., , , , , and . Wirel. Commun. Mob. Comput., (2021)Security cooperation model based on topology control and time synchronization for wireless sensor networks., , , , , , and . J. Commun. Networks, 21 (5): 469-480 (2019)A Dual-view Attention Neural Network for Assigning Industrial Categories to Academic Patents., , , , and . PACIS, page 73. (2023)Object Oriented Property Attestation for Trusted Storage., , , and . CIT (2), page 93-97. IEEE Computer Society, (2009)978-0-7695-3836-5.An Efficient Influence Maximization Algorithm Considering Both Positive and Negative Relationships., , and . Trustcom/BigDataSE/ISPA, page 1931-1936. IEEE, (2016)DynaPro: Dynamic Wireless Sensor Network Data Protection Algorithm in IoT via Differential Privacy., , , , , and . IEEE Access, (2019)