Author of the publication

Image registration algorithm based on point features of sub-pixel.

, , and . IGARSS, page 501-504. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transmission Line Rating Attack in Two-Settlement Electricity Markets., , , and . IEEE Trans. Smart Grid, 7 (3): 1346-1355 (2016)Implementing a Personal Health Record Cloud Platform Using Ciphertext-Policy Attribute-Based Encryption., , and . INCoS, page 8-14. IEEE, (2012)Informed dynamic scheduling strategies for novel majority-logic decoding of non-binary LDPC codes., and . ICSPCS, page 1-6. IEEE, (2015)Who stole my cheese?: Verifying intactness of anonymous RFID systems., , , , , , and . Ad Hoc Networks, (2016)Design of a programmable and low-frequency filter for biomedical signal sensing applications., , , and . CISP-BMEI, page 1746-1750. IEEE, (2016)Adaptive Reliable H∞ Control for a Class of T-S Fuzzy Systems With Stochastic Actuator Failures., , , and . IEEE Access, (2017)Trilevel Modeling of Cyber Attacks on Transmission Lines., and . IEEE Trans. Smart Grid, 8 (2): 720-729 (2017)Microgrid Risk Analysis Considering the Impact of Cyber Attacks on Solar PV and ESS Control Systems., , , , , and . IEEE Trans. Smart Grid, 8 (3): 1330-1339 (2017)Direction as a Spatial Object: A Summary of Results., and . ACM-GIS, page 69-75. ACM, (1998)ENDA: embracing network inconsistency for dynamic application offloading in mobile cloud computing., , , and . MCC@SIGCOMM, page 39-44. ACM, (2013)