Author of the publication

Spread spectrum compressed sensing MRI using chirp radio frequency pulses.

, , , , , and . ICASSP, page 689-693. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fused road detection approach in high resolution multi-spectrum remote sensing imagery., , and . IGARSS, page 1557-1560. IEEE, (2005)Construction method of concept lattice based on improved variable precision rough set., , and . Neurocomputing, (2016)Towards privacy-preserving RFID-based location-based services., , , , and . FSKD, page 2827-2831. IEEE, (2012)Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?., , , , , , , , and . Peer-to-Peer Computing, page 11-20. IEEE, (2009)Analysis of Man-In-The-Middle of Attack on Bitcoin Address., , , and . ICETE (2), page 554-561. SciTePress, (2018)A Hybrid Approach for Privacy Preservation in Location Based Queries., , , , , and . WAIM Workshops, volume 7901 of Lecture Notes in Computer Science, page 315-326. Springer, (2013)Location Semantics Protection Based on Bayesian Inference., , , , and . WAIM, volume 9098 of Lecture Notes in Computer Science, page 297-308. Springer, (2015)SWORDS: Improving Sensor Networks Immunity under Worm Attacks., , , and . WAIM, volume 6184 of Lecture Notes in Computer Science, page 86-96. Springer, (2010)A Secure Route Optimization Mechanism for Expressive Internet Architecture (XIA) Mobility., , , and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 269-281. Springer, (2015)Extracting Service Aspects from Web Reviews., , and . WISM, volume 6318 of Lecture Notes in Computer Science, page 320-327. Springer, (2010)