Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Locating the source in wireless sensor networks with unknown start transmission time., , , , and . ICL-GNSS, page 1-6. IEEE, (2021)Mobile Communication Signal Selection Algorithm for Signal of Opportunity Navigation., , , , , and . ICACT, page 166-171. IEEE, (2022)A lightweight privacy protection scheme based on user preference in mobile crowdsensing., , , , and . Trans. Emerg. Telecommun. Technol., (2021)A modified multivariate spectral gradient projection method for nonlinear complementarity problems., , and . Comput. Appl. Math., 42 (8): 323 (December 2023)Implementation of the AutoComplete Feature of the Textbox Based on Ajax and Web Service., and . J. Comput., 8 (9): 2197-2203 (2013)Optimal Resource Allocation for Energy Efficient Transmission in DSL., , , , and . GLOBECOM, page 1-6. IEEE, (2016)PRAM: privacy preserving access management scheme in cloud services., , , , , and . SCC@ASIACCS, page 41-46. ACM, (2013)A Secure Document Self-Destruction Scheme: An ABE Approach., , , , and . HPCC/EUC, page 59-64. IEEE, (2013)Improved GMM-UBM/SVM For Speaker Verification., , , and . ICASSP (1), page 925-928. IEEE, (2006)Horizontal Pyramid Matching for Person Re-identification., , , , , , , and . CoRR, (2018)