Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Complementing Security Breach of Authentication by Using Shared Authentication Information in Mobile WiMAX Networks., , and . IEICE Transactions, 91-B (8): 2728-2730 (2008)Adaptive undersampling for efficient mobile ray tracing., , , , , and . The Visual Computer, 32 (6-8): 801-811 (2016)Micro-Doppler Based Classification of Human Aquatic Activities via Transfer Learning of Convolutional Neural Networks., , , and . Sensors, 16 (12): 1990 (2016)Human Detection Using Doppler Radar Based on Physical Characteristics of Targets., , and . IEEE Geosci. Remote. Sens. Lett., 12 (2): 289-293 (2015)TrustAL: Trustworthy Active Learning using Knowledge Distillation., , , , and . CoRR, (2022)Analyses of non-coding somatic drivers in 2,658 cancer whole genomes., , , , , , , , , and 179 other author(s). Nat., 578 (7793): 102-111 (2020)Single-spin resonance in a van der Waals embedded paramagnetic defect, , , , , , , , , and 4 other author(s). Nature materials, 20 (8): 1079-1084 (2021)Global Freeze/Thaw Product from L-Band Radiometer Data., , , , , and . IGARSS, page 3762-3764. IEEE, (2018)Enhancing Security Using the Discarded Security Information in Mobile WiMAX Networks., and . GLOBECOM, page 2046-2050. IEEE, (2008)Mobility and its impact on the performance of hierarchical multicast retransmission., and . ICC, page 2029-2035. IEEE, (2002)