Author of the publication

Quaternion Filtering Based on Quaternion Involutions and its Application in Signal Processing.

, and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Sizes of Diffuse Ly$\alpha$ Nebulae around Star-Forming Galaxies at High Redshift, , , , , , , , and . (2016)cite arxiv:1611.03510Comment: Resubmitted to ApJ after the referee's comments.A new audio steganalysis method based on linear prediction., , , and . Multimedia Tools Appl., 77 (12): 15431-15455 (2018)Switching criterion for sub-and super-Gaussian additive noise in adaptive filtering., , and . Signal Process., (2018)Information-Assisted Density Peak Index for Hyperspectral Band Selection., , and . IEEE Geosci. Remote. Sens. Lett., 14 (10): 1870-1874 (2017)Complex-Valued adaptive networks based on entropy estimation., , , and . Signal Process., (2018)An Alternating Variable Step-Size Adaptive Long-Range Prediction of LMS Fading Signals., , , and . IJDSN, (2015)Security Analysis of User Efficient Blind Signatures., , and . AWCC, volume 3309 of Lecture Notes in Computer Science, page 167-172. Springer, (2004)Improved Privacy-Protecting Proxy Signature Scheme., , and . AWCC, volume 3309 of Lecture Notes in Computer Science, page 208-213. Springer, (2004)Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model., , , and . ICISC, volume 10157 of Lecture Notes in Computer Science, page 239-253. (2016)Efficient keyword search for public-key setting., and . MILCOM, page 1236-1241. IEEE, (2015)