Author of the publication

Received Signal Strength Based Indoor Positioning Using a Random Vector Functional Link Network.

, , , , , , and . IEEE Trans. Ind. Informatics, 14 (5): 1846-1855 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BCMCMI: A Fusion Model for Predicting circRNA-miRNA Interactions Combining Semantic and Meta-path., , , , and . J. Chem. Inf. Model., 63 (16): 5384-5394 (August 2023)An Efficient EM Algorithm for Energy-Based Multisource Localization in Wireless Sensor Networks., , and . IEEE Trans. Instrumentation and Measurement, 60 (3): 1017-1027 (2011)High-Order Model-Free Adaptive Iterative Learning Control of Pneumatic Artificial Muscle With Enhanced Convergence., , , , , , and . IEEE Trans. Ind. Electron., 67 (11): 9548-9559 (2020)A low-cost architecture for multi-mode Reed-Solomon decoder., , , , and . ISOCC, page 332-334. IEEE, (2012)A Lightweight and Secure Group Key Based Handover Authentication Protocol for the Software-Defined Space Information Network., , , , and . IEEE Trans. Wirel. Commun., 19 (6): 3673-3684 (2020)Complementary Coded Scrambling Multiple Access and Its Performance in Downlink MIMO Channels., , , , and . IEEE Trans. Wirel. Commun., 17 (2): 835-847 (2018)Prediction of China's Sulfur Dioxide Emissions by Discrete Grey Model with Fractional Order Generation Operators., , and . Complex., (2018)A local tournament contains a vertex whose out-arcs are pseudo-girth-pancyclic., , , and . J. Graph Theory, 62 (4): 346-361 (2009)DF-PLSTM-FCN: A Method for Unmanned Driving Based on Dual-Fusions and Parallel LSTM-FCN., , , and . ICONIP (1), volume 12532 of Lecture Notes in Computer Science, page 75-87. Springer, (2020)Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising., , , , and . ACM Conference on Computer and Communications Security, page 129-140. ACM, (2014)