Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Mathematical Modeling of Exploitations and Mitigation Techniques Using Set Theory., , , and . IEEE Symposium on Security and Privacy Workshops, page 323-328. IEEE Computer Society, (2018)Multi-rate System Design Through Integrating Synchronous Components.. ICTAC, volume 9399 of Lecture Notes in Computer Science, page 464-482. Springer, (2015)Stochastic 2-D Motion Planning with a POMDP Framework., and . CoRR, (2018)Registration-based compensation using sparse representation in conformal-array STAP., , , and . Signal Process., 91 (10): 2268-2276 (2011)Applications of colloidal quantum dots., , , , , , , , , and . Microelectron. J., 40 (3): 644-649 (2009)Micro-innovative Design of Internet Products from the Perspective of User Stickiness - Illustrated by the Case of 360 Applets., and . HCI (38), volume 1224 of Communications in Computer and Information Science, page 94-99. Springer, (2020)A high-speed 3-D image measurement method., and . Artif. Life Robotics, 16 (4): 526-528 (2012)A Practical Chinese Dependency Parser Based on A Large-scale Dataset., , , and . CoRR, (2020)Trajectory optimization on manifolds with applications to quadrotor systems., , , , and . Int. J. Robotics Res., (2020)A Novel Hybrid Attention-Driven Multistream Hierarchical Graph Embedding Network for Remote Sensing Object Detection., , , , , , , , , and . Remote. Sens., 14 (19): 4951 (2022)