Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Determination of Planetary Boundary Layer height with Lidar Signals Using Maximum Limited Height Initialization and Range Restriction (MLHI-RR)., , , , , and . Remote. Sens., 12 (14): 2272 (2020)Lidar Ratio Regional Transfer Method for Extinction Coefficient Accuracy Improvement in Lidar Networks., , , , , , , and . Remote. Sens., 14 (3): 626 (2022)Development of ZJU High-Spectral-Resolution Lidar for Aerosol and Cloud: Extinction Retrieval., , , , , and . Remote. Sens., 12 (18): 3047 (2020)A Two-Stage GCN-Based Deep Reinforcement Learning Framework for SFC Embedding in Multi-Datacenter Networks., , , , , and . IEEE Trans. Netw. Serv. Manag., 20 (4): 4297-4312 (December 2023)Efficient Data Possession Auditing for Real-World Cloud Storage Environments., , , , and . IEICE Trans. Inf. Syst., 98-D (4): 796-806 (2015)Practical Single Sign-on Mechanism for Distributed Computer Networks., , , and . Ad Hoc Sens. Wirel. Networks, 31 (1-4): 131-149 (2016)AI-Enabled Automated and Closed-Loop Optimization Algorithms for Delay-Aware Network., , , , , and . WCNC, page 806-811. IEEE, (2022)Applying Binary Patch Comparison to Cisco IOS., , , and . ICNCC, page 38-42. ACM, (2017)Function Recognition in Stripped Binary of Embedded Devices., , , and . IEEE Access, (2018)TH-VSS: An Asymmetric Storage Virtualization System for the SAN Environment., , , and . International Conference on Computational Science (3), volume 3516 of Lecture Notes in Computer Science, page 399-406. Springer, (2005)