Author of the publication

Protection Strategy for Wireless Charging Electrical Vehicles.

, , , , , and . IEEE Trans. Veh. Technol., 69 (11): 13510-13520 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards human-like and transhuman perception in AI 2.0: a review., , , , , , , , , and 3 other author(s). Frontiers Inf. Technol. Electron. Eng., 18 (1): 58-67 (2017)Practical quantum digital signature with configurable decoy states., , , and . Quantum Inf. Process., 19 (5): 151 (2020)Session details: Session 2: Short Oral Session.. CEA@ICMR, ACM, (2019)Improving the performance of decoy-state quantum digital signature with single-photon-added coherent sources., , , , and . Quantum Inf. Process., 19 (7): 198 (2020)Towards an automatic deployment model of IoT services in Fog computing using an adaptive differential evolution algorithm., , , , , , and . Internet Things, (December 2023)Multi-type concept drift detection under a dual-layer variable sliding window in frequent pattern mining with cloud computing., , , , , and . J. Cloud Comput., 13 (1): 40 (December 2024)A fast algorithm based on gray level co-occurrence matrix and Gabor feature for HEVC screen content coding., , , and . J. Vis. Commun. Image Represent., (2021)The Nesterov accelerated gradient algorithm for Auto-Regressive Exogenous models with random lost measurements: Interpolation method and auxiliary model method., , , and . Inf. Sci., (February 2024)Hypothesis testing on compound symmetric structure of high-dimensional covariance matrix., , , and . Comput. Stat. Data Anal., (September 2023)Suppression Method for Main-Lobe Interrupted Sampling Repeater Jamming in Distributed Radar., , , , and . IEEE Access, (2020)