Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Asymptotical synchronization for a class of coupled time-delay partial differential systems via boundary control., , , and . Neurocomputing, (2016)Classification and Reconstruction of High-Dimensional Signals From Low-Dimensional Features in the Presence of Side Information., , , , , , , and . IEEE Trans. Information Theory, 62 (11): 6459-6492 (2016)Adaptive relaying for full-duplex energy harvesting enabled cooperative communication in harsh environments., , , , and . MILCOM, page 85-90. IEEE, (2016)Finite-time stability of impulsive reaction-diffusion systems with and without time delay., , , , and . Applied Mathematics and Computation, (2019)Against Spyware Using CAPTCHA in Graphical Password Scheme., , , , , and . CoRR, (2013)An Effective Instruction Optimization Method for Embedded Real-Time Java Processor., , , and . ICPP Workshops, page 225-231. IEEE Computer Society, (2005)Proactive Mitigation to Table-Overflow in Software-Defined Networking., , , and . ISCC, page 719-725. IEEE, (2018)Detecting Chinese Domain Name Piracy., and . CSAI/ICIMT, page 530-535. ACM, (2018)Object Detection Combining Recognition and Segmentation., , , and . ACCV (1), volume 4843 of Lecture Notes in Computer Science, page 189-199. Springer, (2007)A Critical Quantity for Noise Attenuation in Feedback Systems., , and . PLoS Computational Biology, (2010)