Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Eavesdropping security in wireless ad hoc networks with directional antennas., , and . WOCC, page 687-692. IEEE, (2013)On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas., , , and . Int. J. Distributed Sens. Networks, (2013)Exploring Technology Professional Development Needs of Digital Immigrant Teachers and Digital Native Teachers in China., , and . Int. J. Inf. Commun. Technol. Educ., 16 (3): 15-29 (2020)The influence of individual espoused cultural values on self-directed use of technology for language learning beyond the classroom., , , and . Comput. Hum. Behav., (2016)Yolo-MSAPF: Multiscale Alignment Fusion With Parallel Feature Filtering Model for High Accuracy Weld Defect Detection., , , , , , , , and . IEEE Trans. Instrum. Meas., (2023)3-D image reconstruction for bio nanomachines with helical symmetry: Image formation theory., and . ICIP, page 892-896. IEEE, (2015)An Opto-mechanical MEMS Accelerometer with Noise Floor of 40 ng/Hz1/2., , , , , and . NEMS, page 140-143. IEEE, (2023)Tight frame learning for cardiovascular MRI., , , , , and . ISBI, page 290-293. IEEE, (2013)Connectivity of underwater cognitive acoustic networks under spectrum constraint., , , and . WUWNet, page 33:1-33:2. ACM, (2018)Eavesdropping attacks in underwater acoustic networks., , , and . ICICS, page 1-5. IEEE, (2015)