Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Superpoints Using a Vector Bloom Filter., , , and . IEEE Trans. Inf. Forensics Secur., 11 (3): 514-527 (2016)A Current-stress-optimized Control Strategy for DAB Converter Using Hybrid Modulation., , , , , , and . IECON, page 1148-1153. IEEE, (2020)Clustering and Profiling IP Hosts Based on Traffic Behavior., , , and . J. Networks, 10 (2): 99-107 (2015)Study on the symbiotic development path of traditional villages in the county based on the grey relation analysis: the case of Xunxian County in Henan, China., , and . Grey Syst. Theory Appl., 13 (1): 193-205 (2023)Data-Independent Phase-Only Beamforming of FDA-MIMO Radar for Swarm Interference Suppression., , , , and . Remote. Sens., 15 (4): 1159 (February 2023)A Novel Method for Fast Positioning of Non-Standardized Ground Control Points in Drone Images., , , and . Remote. Sens., 13 (15): 2849 (2021)Low observable group targets detection based on space-frequency cascaded adaptive processing for MIMO OTH radar., and . Multidimens. Syst. Signal Process., 32 (3): 1005-1026 (2021)IP backbone traffic behavior characteristic spectrum composing and role mining., , , , and . CCF Trans. Netw., 2 (3-4): 153-171 (2019)Attack scenario reconstruction via fusing heterogeneous threat intelligence., , , and . Comput. Secur., (October 2023)Useful Traffic Loss Rate Estimation Based on Network Layer Measurement., , and . IEEE Access, (2019)