Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Noise-Tolerant Wireless Sensor Networks Localization via Multinorms Regularized Matrix Completion., , , , and . IEEE Trans. Veh. Technol., 67 (3): 2409-2419 (2018)Assessment of the Effectiveness of Sand-Control and Desertification in the Mu Us Desert, China., , , , , , , , , and 5 other author(s). Remote. Sens., 14 (4): 837 (2022)An efficient bi-objective optimization framework for statistical chip-level yield analysis under parameter variations., , , and . Frontiers Inf. Technol. Electron. Eng., 17 (2): 160-172 (2016)Detecting Land Degradation in Eastern China Grasslands with Time Series Segmentation and Residual Trend analysis (TSS-RESTREND) and GIMMS NDVI3g Data., , , , , , and . Remote. Sens., 11 (9): 1014 (2019)Emergency order response strategy under supply chain collaboration., and . RAIRO Oper. Res., 57 (4): 2239-2265 (2023)WiDE: WiFi Distance Based Group Profiling Via Machine Learning., , , , , , , , and . IEEE Trans. Mob. Comput., 22 (1): 607-620 (2023)5GMEC-DP: Differentially private protection of trajectory data based on 5G-based mobile edge computing., , and . Comput. Networks, (2022)GLADS: A global-local attention data selection model for multimodal multitask encrypted traffic classification of IoT., , and . Comput. Networks, (April 2023)Research on Automatic Trajectory Planning Method of Unmanned Ships Based on Multi-Objective Optimization., and . IEEE Access, (2023)Requirement-Oriented Privacy Protection Analysis Architecture in Cloud Computing., , , and . J. Commun., 10 (1): 55-63 (2015)