Author of the publication

Boosting training for myoelectric pattern recognition using Mixed-LDA.

, , , and . EMBC, page 14-17. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantum Network Coding Against Pollution Attacks., , , and . IEEE Communications Letters, 20 (7): 1369-1372 (2016)A DP Canopy K-Means Algorithm for Privacy Preservation of Hadoop Platform., , , and . CSS, volume 10581 of Lecture Notes in Computer Science, page 189-198. Springer, (2017)Clustering Algorithm for Privacy Preservation on MapReduce., , , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 622-632. Springer, (2018)Connectivity of two nodes in cognitive radio ad hoc networks., , , , and . WCNC, page 1186-1191. IEEE, (2013)SCPS: A Social-Aware Distributed Cyber-Physical Human-Centric Search Engine., , , , and . GLOBECOM, page 1-5. IEEE, (2011)Joint Uplink-Downlink Resource Allocation under Outage Case in Vehicular Communications., , , , , and . ICPADS, page 929-932. IEEE, (2019)Quantification and solutions of arm movements effect on sEMG pattern recognition., , , and . Biomed. Signal Process. Control., (2014)Efficient group key management for secure big data in predictable large-scale networks., , , , and . Concurr. Comput. Pract. Exp., 28 (4): 1174-1192 (2016)多跳无线网络干扰攻击建模与性能分析 (Modeling of Jamming Attack and Performance Analysis in Multi-hop Wireless Network)., , , and . 计算机科学, 46 (11A): 414-416 (2019)A Refined Analysis of Zcash Anonymity., , , and . IEEE Access, (2020)