Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linguistic Accommodation Enhances Compliance to Charity Donation: The Role of Interpersonal Communication Processes in Mediated Compliance-Gaining Conversations., , , and . J. Comput. Mediat. Commun., 26 (3): 167-185 (2021)egoDetect: Visual Detection and Exploration of Anomaly in Social Communication Network., , , , and . Sensors, 20 (20): 5895 (2020)A Multi-Target Localization and Vital Sign Detection Method Using Ultra-Wide Band Radar., , , , , , and . Sensors, 23 (13): 5779 (July 2023)Adaptive Determination of PMI Feedback Period for FDD PDSCH in 5G eMBB Scenario., , , , and . ICCCS, page 628-634. IEEE, (2020)Fast Transient Harmonic Selective Extraction Based on Modulation-CDSC-SDFT., , and . I2MTC, page 1-6. IEEE, (2021)An investigation of contents and use of the home wardrobe., , and . UbiComp, page 203-206. ACM, (2012)Integrating Ultrathin Bulk-Heterojunction Organic Semiconductor Intermediary for High-Performance Low-Bandgap Perovskite Solar Cells with Low Energy Loss, , , , , , , , , and . Advanced Functional Materials, (2018)Continuous Phase Modulation Classification via Baum-Welch Algorithm., , , and . IEEE Communications Letters, 22 (7): 1390-1393 (2018)Retrieval of Leaf Chlorophyll Content of Paddy Rice with Extracted Foliar Hyperspectral Imagery., , , , , and . Agro-Geoinformatics, page 1-5. IEEE, (2018)Industrial Anomaly Detection and Attack Classification Method Based on Convolutional Neural Network., , and . Secur. Commun. Networks, (2019)