Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constant force grinding control method for unknown curve part based on force/torque information., , and . IJMR, 11 (1): 53-67 (2016)SHA-less pipelined ADC converting 10th Nyquist band with in-situ clock-skew calibration., , , , , , , , , and 2 other author(s). CICC, page 1-4. IEEE, (2010)A Fast Approach to Explore the Reduction of Concept Lattice., , and . FSKD (5), page 512-515. IEEE Computer Society, (2008)978-0-7695-3305-6.A Robust Vehicle Detection Model Based on Attention and Multi-scale Feature Fusion., , , and . WCSP, page 143-148. IEEE, (2022)Waveguide Eavesdropping Threat for Terahertz Wireless Communications., , , , , , , and . IEEE Commun. Mag., 62 (2): 80-84 (2024)An iterative framework for unsupervised learning in the PLDA based speaker verification., , and . ISCSLP, page 78-82. IEEE, (2014)On Order-Constrained Transitive Distance Clustering., , , , , and . AAAI, page 2293-2299. AAAI Press, (2016)Color image authentication based on spatiotemporal chaos and SVD, and . Chaos, Solitons & Fractals, 36 (4): 946--952 (May 2008)A Peer-to-Peer Internet Video Broadcast System Utilizing the Locality Properties., , , and . HPCC, page 404-411. IEEE Computer Society, (2008)Joint recognition / segmentation with cascaded multi-level feature classification and confidence propagation., , and . ICME Workshops, page 1-4. IEEE Computer Society, (2013)