Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Embedded connectivity of recursive networks., , , and . Theor. Comput. Sci., (2016)Mitigating jamming attacks in wireless broadcast systems., , and . Wireless Networks, 19 (8): 1867-1880 (2013)Neural bases of asymmetric language switching in second-language learners: An ER-fMRI study., , , , and . NeuroImage, 35 (2): 862-870 (2007)Using Auxiliary Sensors for Pairwise Key Establishment in WSN., and . Networking, volume 4479 of Lecture Notes in Computer Science, page 251-262. Springer, (2007)Imbalanced Deep Learning by Minority Class Incremental Rectification., , and . CoRR, (2018)Constructing Trustworthy and Safe Communities on a Blockchain-Enabled Social Credits System., , , and . MobiQuitous, page 449-453. ACM, (2018)Cartesian factorized backprojection algorithm for synthetic aperture radar., , , and . IGARSS, page 1074-1077. IEEE, (2016)Fast jamming detection in sensor networks., , , and . ICC, page 934-938. IEEE, (2012)Spectrum Sharing Scheme for Multi-UAVs Relay Network Based on Matching Theory., , , , , and . ICIRA (4), volume 11743 of Lecture Notes in Computer Science, page 84-92. Springer, (2019)Trajectory optimization for RLV in TAEM phase using adaptive Gauss pseudospectral method., and . Sci. China Inf. Sci., 62 (1): 10206:1-10206:3 (2019)