Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Acceleration of fast factorized back projection algorithm for bistatic SAR., , and . IGARSS, page 2493-2496. IEEE, (2013)Discrete-time adaptive iterative learning control for high-order nonlinear systems with unknown control directions., , and . Int. J. Control, 86 (2): 299-308 (2013)A Supervised Multi-Spike Learning Algorithm for Spiking Neural Networks., , and . IJCNN, page 1-7. IEEE, (2018)Study on police graphic plotting technology based on web., , , , and . ICSCA, page 137-143. ACM, (2017)Study on Dynamic Variation Regularities of Regional Groundwater Depth Based on Complexity Diagnosis., , , and . CCTA (2), volume 369 of IFIP Advances in Information and Communication Technology, page 72-83. Springer, (2011)Hypervisor-based protection of sensitive files in a compromised system., , , , and . SAC, page 1765-1770. ACM, (2012)Discrete-time adaptive learning control for parametric uncertainties with unknown periods., and . CDC, page 1786-1791. IEEE, (2013)Improving Separation Performance of Wireless Communication Signals with Antenna Angle Adjustment., , and . ICCT, page 689-693. IEEE, (2022)ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks., , , , and . NDSS, The Internet Society, (2014)SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services., , , , and . SecureComm, volume 164 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 193-211. Springer, (2015)