Author of the publication

A Multi-Scale CNN Framework for Wireless Technique Classification in Internet of Things

, , , , and . IEEE Internet of Things Journal, 4662 (c): 9--10 (2021)
DOI: 10.1109/JIOT.2021.3132652

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-time 3D Football Ball Tracking from Multiple Cameras., , , and . BMVC, page 1-10. BMVA Press, (2004)Qsimulation V2.0: An Optimized Quantum Simulator., , , and . ICTAC, volume 12545 of Lecture Notes in Computer Science, page 307-316. Springer, (2020)Self-coexistence and spectrum sharing in device-to-device WRANs., , , , and . ICC, page 1651-1656. IEEE, (2014)Enabling Assured Deletion in the Cloud Storage by Overwriting., , , and . SCC@AsiaCCS, page 17-23. ACM, (2016)Channel-Max, Channel-Drop and Stochastic Max-pooling., , , and . CVPR Workshops, page 9-17. IEEE Computer Society, (2015)A Novel File Carving Algorithm for EVTX Logs., , , , , , , and . ICDF2C, volume 216 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 97-105. Springer, (2017)A Fast Ensemble Pruning Algorithm Based on Pattern Mining Process., , and . ECML/PKDD (1), volume 5781 of Lecture Notes in Computer Science, page 34. Springer, (2009)Symbolic Reachability Computation of a Class of Nonlinear Systems., , and . ACIS-ICIS, page 706-710. IEEE Computer Society, (2009)Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation., , , , and . TrustCom/BigDataSE/ISPA (1), page 434-442. IEEE, (2015)Detecting Rogue AP with the Crowd Wisdom., , , , and . ICDCS, page 2327-2332. IEEE Computer Society, (2017)