Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A scheme for generating a multi-photon NOON state based on cavity QED., , , and . Quantum Information Processing, 12 (1): 449-457 (2013)Different dynamics of classical and quantum correlations under decoherence., , , , and . Quantum Information Processing, 11 (6): 1845-1865 (2012)Scheme for assisted cloning an unknown arbitrary three-qubit state., and . Quantum Information Processing, 10 (4): 567-574 (2011)A Method for Countering Snooping-Based Side Channel Attacks in Smart Home Applications., , and . ChinaCom (1), volume 209 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 200-207. Springer, (2016)Load Aware Routing with Delay Threshold for Vehicular Ad Hoc Networks., , , and . ICPADS, page 868-873. IEEE Computer Society, (2010)A Mapping Scheme of Users to SCMA Layers for D2D Communications., , , , , , , and . VTC Spring, page 1-5. IEEE, (2016)A Stretchable Pressure-Sensitive Array Based on Polymer Matrix., , and . Sensors, 17 (7): 1571 (2017)SEED: Public Energy and Environment Dataset for Optimizing HVAC Operation in Subway Stations., , and . CoRR, (2013)An Anti-Blocking Particle Filter Tracking Algorithm., , , and . ISCID (1), page 61-64. IEEE, (2018)Hierarchical Salient Object Detection Network with Dense Connections., , , , , and . ICIG (1), volume 11901 of Lecture Notes in Computer Science, page 454-466. Springer, (2019)