Author of the publication

Track Occupation Detection Based on a Maximum Posterior Probability Model Using Multisensor Data Fusion.

, , , , and . Comput. Sci. Eng., 21 (6): 40-54 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of GGH Map., and . IACR Cryptology ePrint Archive, (2015)A new Gaussian sampling for trapdoor lattices with arbitrary modulus., and . Des. Codes Cryptogr., 87 (11): 2553-2570 (2019)On New Zero-Knowledge Proofs for Fully Anonymous Lattice-Based Group Signature Scheme with Verifier-Local Revocation., , , , and . ACNS Workshops, volume 12418 of Lecture Notes in Computer Science, page 381-399. Springer, (2020)Fuzzy Identity-Based Signature from Lattices for Identities in a Large Universe., , , , and . ICCCS (3), volume 11065 of Lecture Notes in Computer Science, page 573-584. Springer, (2018)An Optimization of Gu Map-1., and . IACR Cryptology ePrint Archive, (2015)基于混淆的广播多重签名方案 (Obfuscation-based Broadcasting Multi-signature Scheme)., , , and . 计算机科学, 44 (Z11): 329-333 (2017)Scenario Grouping and Decomposition Algorithms for Chance-Constrained Programs., , , , and . INFORMS J. Comput., 33 (2): 757-773 (2021)Benders Cut Classification via Support Vector Machines for Solving Two-Stage Stochastic Programs., and . INFORMS J. Optim., 3 (3): 278-297 (July 2021)The University of Michigan Implements a Hub-and-Spoke Design to Accommodate Social Distancing in the Campus Bus System Under COVID-19 Restrictions., , , , and . INFORMS J. Appl. Anal., 52 (6): 539-552 (2022)Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security., , , , and . ACNS Workshops, volume 12809 of Lecture Notes in Computer Science, page 332-345. Springer, (2021)