Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Application of Penetration Attack Tree Model Oriented to Attack Resistance Test., , , and . CSSE (3), page 622-626. IEEE Computer Society, (2008)978-0-7695-3336-0.Trusted Group Key Management for Real-Time Critical Infrastructure Protection., , , , , , , and . MILCOM, page 248-253. IEEE, (2013)Maximizing MPI point-to-point communication performance on RDMA-enabled clusters with customized protocols., and . ICS, page 306-315. ACM, (2009)Research on path generation and stability control method for UAV-based intelligent spray painting of ships., , , , , , , , and . J. Field Robotics, 39 (3): 188-202 (2022)Event-triggered receding horizon control via actor-critic design., , and . Sci. China Inf. Sci., (2020)Multi-Path Routing on the Jellyfish Networks., , and . CoRR, (2020)Pairwise-based Multi-Attribute Decision Making Approach for Wireless Network., , , , and . CoRR, (2019)A Comprehensive Database for Benchmarking Imaging Systems., , , , , , , , , and 1 other author(s). IEEE Trans. Pattern Anal. Mach. Intell., 42 (3): 509-520 (2020)Learning Nonlocal Sparse and Low-Rank Models for Image Compressive Sensing: Nonlocal sparse and low-rank modeling., , , , , and . IEEE Signal Process. Mag., 40 (1): 32-44 (2023)Snapshot Compressive Imaging: Theory, Algorithms, and Applications., , and . IEEE Signal Process. Mag., 38 (2): 65-88 (2021)