Author of the publication

An Inclination Estimation Method for UAV Landing Surfaces Using Millimeterwave Radar.

, , , , , and . IGARSS, page 2049-2052. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile 'tsunagari-kan': always-on, casual telecommunication., and . Mobile HCI, page 227-230. ACM, (2005)Password Based Anonymous Authentication with Private Information Retrieval., , , , and . J. Digit. Inf. Manag., 9 (2): 72-78 (2011)Cross-Certification Towards Distributed Authentication Infrastructure: A Case of Hyperledger Fabric., , , , , and . IEEE Access, (2020)PPM: Privacy Policy Manager for Personalized Services., , , , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 377-392. Springer, (2013)A data-driven approach for reconstructing bifurcation diagrams of discrete dynamical systems., , and . LifeTech, page 294-295. IEEE, (2019)Certificate Management Scheme for VANETs Using Blockchain Structure., , , , , and . Cryptogr., 6 (2): 20 (2022)Learning Multimodal Representations for Drowsiness Detection., , , , and . IEEE Trans. Intell. Transp. Syst., 23 (8): 11539-11548 (2022)Private Information Retrieval from Coded Storage in the Presence of Omniscient and Limited-Knowledge Byzantine Adversaries., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 104-A (9): 1271-1283 (2021)Analysis of Trust Factors in Children's Abilities to Use Digital Devices., , , and . GoodIT, page 82-88. ACM, (2022)Systematizing the State of Knowledge in Detecting Privacy Sensitive Information in Unstructured Texts using Machine Learning., , , and . PST, page 1-7. IEEE, (2023)