Author of the publication

A Wideband Real-Time Deception Jamming Method for Countering ISAR Based on Parallel Convolution.

, , , , , and . IEICE Trans. Commun., 103-B (5): 609-617 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Unknown Radar Emitter Identification Method Based on Semi-Supervised and Transfer Learning., , , , , and . Algorithms, 12 (12): 271 (2019)A Two-Dimensional Frequency Modulation Deception Jamming Against ISAR., , , , , and . IEEE Access, (2019)A study on blanket noise jamming to LFM pulse compression radar., , , and . ICSPCC, page 1-5. IEEE, (2017)A Wideband Real-Time Deception Jamming Method for Countering ISAR Based on Parallel Convolution., , , , , and . IEICE Trans. Commun., 103-B (5): 609-617 (2020)Focus on discovering mechanisms: a relativistic, agent-directed, perfused liver., , and . SpringSim, SCS/ACM, (2009)On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work., , , and . IACR Cryptol. ePrint Arch., (2020)On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work., , , and . EUROCRYPT (2), volume 12697 of Lecture Notes in Computer Science, page 598-629. Springer, (2021)Fingerprint identification using local Gabor filters., , , , and . NCM, page 626-631. IEEE Computer Society, (2010)Direct Minutiae Matching in Gray-Level Fingerprint Images., , , and . ICICIC (3), page 577-580. IEEE Computer Society, (2006)Competitive algorithms for the clustering of noisy data., and . Fuzzy Sets Syst., 141 (2): 281-299 (2004)