Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multimodal feature fusion for robust event detection in web videos., , , , , , , and . CVPR, page 1298-1305. IEEE Computer Society, (2012)Mutual Information Evolution Based Performance Analysis in IDMA System., , , , and . VTC Spring, page 1-6. IEEE, (2011)Some Transformation Methods on Probabilistic Model for Crowdsensing Networks., , and . BDCloud, page 304-309. IEEE, (2015)Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function., , , and . J. Inf. Sci. Eng., 30 (6): 1789-1806 (2014)A Bayesian Algorithm for Motion and Structure Estimation from Image Sequences., and . IJCNN, page 2954-2958. IEEE, (2007)Optimal scheduling of multiple sensors over shared channels with packet transmission constraint., , , and . Automatica, (2018)Novel distributed UEP rateless coding scheme for data transmission in deep space networks., , , and . SCIENCE CHINA Information Sciences, 61 (4): 040306:1-040306:10 (2018)Training High-Performance and Large-Scale Deep Neural Networks with Full 8-bit Integers., , , , , and . CoRR, (2019)Learning Optimal Scheduling Policy for Remote State Estimation under Uncertain Channel Condition., , , , and . CoRR, (2018)Cryptanalysis of Round-Reduced LED., , and . IACR Cryptology ePrint Archive, (2015)