Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Video-Based Abnormal Driving Behavior Detection via Deep Learning Fusions., , , , , and . IEEE Access, (2019)Deep characteristics analysis on travel time of emergency traffic., , , , and . Int. J. Comput. Sci. Eng., 22 (1): 162-169 (2020)On the Performance and Complexity of Irregular Variable Length Codes for Near-Capacity Joint Source and Channel Coding., , , , and . IEEE Trans. Wirel. Commun., 7 (4): 1338-1347 (2008)An Efficient Hybrid Beamforming Design for Massive MIMO Receive Systems via SINR Maximization Based on an Improved Bat Algorithm., , , , , , , and . IEEE Access, (2019)Responsive Motif Exploration Using Symmetry Dependency Syntax., , , and . ICSCA, page 302-306. ACM, (2020)Optimal Transmission Topology Construction and Secure Linear Network Coding Design for Virtual-Source Multicast With Integral Link Rates., , , , , and . IEEE Trans. Multim., 20 (11): 3069-3083 (2018)Research on urban transport network topology vulnerability identification under rainfall conditions., , , , and . Int. J. Embed. Syst., 13 (3): 352-359 (2020)Leakage Resilient Provable Data Possession in Public Cloud Storage., , , and . IIH-MSP, page 706-709. IEEE, (2014)The application of the Six Sigma concept to port security process quality control., , , , and . Qual. Reliab. Eng. Int., 23 (5): 631-639 (2007)A mobile assisted coverage hole patching scheme based on particle swarm optimization for WSNs., , , , and . Clust. Comput., 22 (Suppl 1): 1787-1795 (2019)