Author of the publication

A Novel Channel Inconsistency Estimation Method for Azimuth Multichannel SAR Based on Maximum Normalized Image Sharpness.

, , , , , , and . IEEE Trans. Geosci. Remote. Sens., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Universal Chroma Subsampling Strategy for Compressing Mosaic Video Sequences With Arbitrary RGB Color Filter Arrays in H.264/AVC., , , and . IEEE Trans. Circuits Syst. Video Techn., 23 (4): 591-606 (2013)Reversible data hiding for depth maps using the depth no-synthesis-error model., , and . Inf. Sci., (2014)Linear-time prediction mode reduction method for intracoding in H.264/AVC., , , , and . Signal Image Video Process., 11 (3): 447-454 (2017)Intelligent Judgment Method of Superimposed Label Recognition Technology Based on a Deep Learning Target Detection Algorithm for Detecting Wiring Errors in Current Transformer Tests., , , , , , and . CECNet, volume 363 of Frontiers in Artificial Intelligence and Applications, page 417-423. IOS Press, (2022)Interactions among the Phenological Events of Winter Wheat in the North China Plain-Based on Field Data and Improved MODIS Estimation., , , , and . Remote Sensing, 11 (24): 2976 (2019)An Intelligent Human Behavior-Based Reasoning Model for Service Prediction in Smart Home., , and . IEEE Access, (2018)Differentially Private Greedy Decision Forest., , , and . ICASSP, page 2672-2676. IEEE, (2019)Automatic Recognition for Arbitrarily Tilted License Plate., , , , , and . ICVIP, page 23-28. ACM, (2018)A novel comprehensive steganalysis of transmission control protocol/Internet protocol covert channels based on protocol behaviors and support vector machine., , , and . Secur. Commun. Networks, 8 (7): 1279-1290 (2015)A statistical model for DPA when algorithmic noise is dependent on target., , , , , and . Secur. Commun. Networks, 9 (18): 4882-4896 (2016)