Author of the publication

Joint Optimization of a UAV's Trajectory and Transmit Power for Covert Communications.

, , , , , and . IEEE Trans. Signal Process., 67 (16): 4276-4290 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Saccadic trajectory-based identity authentication., , , , and . Multim. Tools Appl., 79 (7-8): 4891-4905 (2020)Image super-resolution based on two-level residual learning CNN., , , , , and . Multim. Tools Appl., 79 (7-8): 4831-4846 (2020)Coupled feature selection based semi-supervised modality-dependent cross-modal retrieval., , , , and . Multim. Tools Appl., 78 (20): 28931-28951 (2019)Visual Attention Based Temporally Weighting Method for Video Hashing., , and . IEEE Signal Process. Lett., 20 (12): 1253-1256 (2013)A Weight-Adaptive Laplacian Embedding for Graph-Based Clustering., , , and . Neural Comput., 29 (7): 1902-1918 (2017)Movie recommendation based on bridging movie feature and user interest., , , and . J. Comput. Sci., (2018)UFvH: Unified Feature Video Hashing for Near-Duplicate Video Retrieval., , , and . VSCC@MM, page 17-24. ACM, (2017)Frame rate up-conversion based on depth guided extended block matching for 3D video., , , , , and . VCIP, page 1-4. IEEE, (2016)A temporal desynchronization resilient video watermarking scheme based on independent component analysis., and . ICIP (1), page 265-268. IEEE, (2005)Data Hiding in Independent Components of Video., , and . ICA, volume 3195 of Lecture Notes in Computer Science, page 970-976. Springer, (2004)