Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Sizes of Diffuse Ly$\alpha$ Nebulae around Star-Forming Galaxies at High Redshift, , , , , , , , and . (2016)cite arxiv:1611.03510Comment: Resubmitted to ApJ after the referee's comments.A new audio steganalysis method based on linear prediction., , , and . Multimedia Tools Appl., 77 (12): 15431-15455 (2018)Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model., , , and . ICISC, volume 10157 of Lecture Notes in Computer Science, page 239-253. (2016)Security Analysis of User Efficient Blind Signatures., , and . AWCC, volume 3309 of Lecture Notes in Computer Science, page 167-172. Springer, (2004)Improved Privacy-Protecting Proxy Signature Scheme., , and . AWCC, volume 3309 of Lecture Notes in Computer Science, page 208-213. Springer, (2004)Efficient keyword search for public-key setting., and . MILCOM, page 1236-1241. IEEE, (2015)Quaternion Filtering Based on Quaternion Involutions and its Application in Signal Processing., and . IEEE Access, (2019)Complex-Valued adaptive networks based on entropy estimation., , , and . Signal Process., (2018)Information-Assisted Density Peak Index for Hyperspectral Band Selection., , and . IEEE Geosci. Remote. Sens. Lett., 14 (10): 1870-1874 (2017)Switching criterion for sub-and super-Gaussian additive noise in adaptive filtering., , and . Signal Process., (2018)