Author of the publication

Theoretical and numerical analyses for PDM-IM signals using Stokes vector receivers.

, , , , , , , , , and . Sci. China Inf. Sci., 63 (10): 1-9 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The yoking-proof-based authentication protocol for cloud-assisted wearable devices., , , , and . Personal and Ubiquitous Computing, 20 (3): 469-479 (2016)Fidelity in Simulation-Based Serious Games., , , and . IEEE Trans. Learn. Technol., 13 (2): 340-353 (2020)Making use of observable parameters in evolutionary dynamic optimization., , , and . Inf. Sci., (2020)A Data-Driven Robustness Algorithm for the Internet of Things in Smart Cities., , , , , and . IEEE Commun. Mag., 55 (12): 18-23 (2017)Top Challenges for Smart Worlds: A Report on the Top10Cs Forum., , , , , , , and . IEEE Access, (2015)A survey of RDF management technologies and benchmark datasets., , , and . J. Ambient Intell. Humaniz. Comput., 9 (5): 1693-1704 (2018)Task Allocation Among Connected Devices: Requirements, Approaches, and Challenges., , and . IEEE Internet Things J., 9 (2): 1009-1023 (2022)A Survey on the Metaverse: The State-of-the-Art, Technologies, Applications, and Challenges., , , , , , , and . IEEE Internet Things J., 10 (16): 14671-14688 (August 2023)Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things., , , , , and . IEEE Internet Things J., 4 (5): 1143-1155 (2017)A Trustworthy Safety Inspection Framework Using Performance-Security Balanced Blockchain., , , , , , and . IEEE Internet Things J., 9 (11): 8178-8190 (2022)