Author of the publication

Hierarchical Attention-Based Sensor Fusion Strategy for Depth Estimation in Diverse Weather.

, , , , and . Int. J. Semantic Comput., 17 (3): 455-475 (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Adaptive DS-Based Finite-Time Neural Tracking Control Scheme for Nonstrict-Feedback Nonlinear Systems., , , and . IEEE Trans. Syst. Man Cybern. Syst., 52 (2): 1014-1018 (2022)Fast True Random Number Generator Based on Chaotic Oscillation in Self-Feedback Weakly Coupled Superlattices., , , , and . IEEE Access, (2020)Analysis of Migraine Induced Monitoring Imaging Data by Multilayer Mixed Cluster Detection., , , , and . J. Medical Imaging Health Informatics, 9 (6): 1278-1283 (2019)Performance analysis and optimization for coverage enhancement strategy of Narrow-band Internet of Things., , , , and . Future Gener. Comput. Syst., (2019)Det-WiFi: A Multihop TDMA MAC Implementation for Industrial Deterministic Applications Based on Commodity 802.11 Hardware., , and . Wirel. Commun. Mob. Comput., (2017)A Novel Data-Oriented Name Service., , , and . J. Commun., 5 (9): 684-691 (2010)A secure cost-effective migration of enterprise applications to the cloud., , , , and . Int. J. Commun. Syst., 27 (12): 3996-4013 (2014)Decision support to product configuration considering component replenishment uncertainty: A stochastic programming approach., , , and . Decis. Support Syst., (2018)All-subkeys-recovery attacks on a variation of Feistel-2 block ciphers., , and . IET Inf. Secur., 11 (5): 230-234 (2017)Impossible differential attacks on the SKINNY family of block ciphers., , and . IET Inf. Secur., 11 (6): 377-385 (2017)