Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

False Data Injection Attack Based on Hyperplane Migration of Support Vector Machine in Transmission Network of the Smart Grid., , , , and . Symmetry, 10 (5): 165 (2018)Multiple Orthogonal Subsets With Three-Valued In-Phase Cross-Correlation for HF Communications., , , , and . IEEE Communications Letters, 20 (7): 1377-1380 (2016)16-QAM Golay Complementary Sequence Sets with Arbitrary Lengths., , , and . IEEE Communications Letters, 17 (6): 1216-1219 (2013)General QAM Golay complementary sequences based on binary signals as their inputs., , and . CISP-BMEI, page 1101-1106. IEEE, (2016)Improvement of code rate in OFDM communication systems encoded by QAM complementary sequences., , and . CISP-BMEI, page 1107-1112. IEEE, (2016)Designing and deploying a bioinformatics software-defined network exchange (SDX): Architecture, services, capabilities, and foundation technologies., , , , , , , , and . ICIN, page 135-142. IEEE, (2017)Interference-plus-Noise Covariance Matrix Reconstruction via Spatial Power Spectrum Sampling for Robust Adaptive Beamforming., , , , and . IEEE Signal Process. Lett., 23 (1): 121-125 (2016)Azimuthal constraint representation for synthetic aperture radar target recognition along with aspect estimation., and . Signal Image Video Process., 13 (8): 1577-1584 (2019)Clustering-based acceleration for virtual machine image deduplication in the cloud environment., , , , and . J. Syst. Softw., (2016)Taxonomy Induction from Chinese Encyclopedias by Combinatorial Optimization., , , , , and . NLPCC, volume 9362 of Lecture Notes in Computer Science, page 299-312. Springer, (2015)