Author of the publication

Secure Two-Way Fiber-Optic Time Transfer Against Sub-ns Asymmetric Delay Attack With Clock Model-Based Detection and Mitigation Scheme.

, , , , , , , , , , , , , , , , , and . IEEE Trans. Instrum. Meas., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Roberts cross operator combined with mathematical morphology algorithm for fabric defect detection., , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 1-8. IEEE, (2022)Class-Wise Adversarial Transfer Network for Remote Sensing Scene Classification., and . IGARSS, page 1357-1360. IEEE, (2020)SHIN ABox Reduction., , and . Description Logics, volume 189 of CEUR Workshop Proceedings, CEUR-WS.org, (2006)Curriculum Multi-Level Learning for Imbalanced Live-Stream Recommendation., , , , , , and . IJCAI, page 2406-2414. ijcai.org, (2023)Robust compressive wideband spectrum sensing based on non-Gaussianity test., , , , and . ICCC, page 698-702. IEEE, (2014)Research on the Application of Intelligent Grading Method based on Improved ML Algorithm in Sustainable English Education., and . Scalable Comput. Pract. Exp., 25 (1): 451-463 (January 2024)Fused User Preference Learning for Task Assignment in Mobile Crowdsourcing., , , and . ICSOC (2), volume 14420 of Lecture Notes in Computer Science, page 227-241. Springer, (2023)The Summary Abox: Cutting Ontologies Down to Size., , , , and . ISWC, volume 4273 of Lecture Notes in Computer Science, page 343-356. Springer, (2006)Compressive Sensing Solution Optimization Method in Sensing-Transmission-Calculation Integrated System., , , , and . HPCC/DSS/SmartCity/DependSys, page 2101-2109. IEEE, (2022)Visual Question Answering Model Based on CAM and GCN., , , and . AIPR, page 746-752. ACM, (2022)