Author of the publication

A 33-Year NPP Monitoring Study in Southwest China by the Fusion of Multi-Source Remote Sensing and Station Data.

, , , , , , and . Remote Sensing, 9 (10): 1082 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Multi-Stage Attacks Based on Multi-Layer Long and Short-Term Memory Network., , , , and . ICC, page 1-6. IEEE, (2019)Active Matrix Color-LCD on 75µm Thick Flexible Glass Susbtrates, , , , , , and . IEEE, Journal of Display Technology (JDT), Vol. 8, No. 6, Pages 309-316, (2012)Balancing trajectory privacy and data utility using a personalized anonymization model., , , and . J. Network and Computer Applications, (2014)UC-Secure Source Routing Protocol., , , and . IACR Cryptology ePrint Archive, (2009)The Development Mode of Trust E-commerce Services., , , , and . ICEBE, page 181-187. IEEE Computer Society, (2009)Research on High-Precision Survey of Supercapacitor Capacity., , and . ISCID (2), page 219-222. IEEE Computer Society, (2011)A Moving Weighted Harmonic Analysis Method for Reconstructing High-Quality SPOT VEGETATION NDVI Time-Series Data., , , , and . IEEE Trans. Geoscience and Remote Sensing, 53 (11): 6008-6021 (2015)Security extension for the Canetti-Krawczyk model in identity-based systems., , and . Science in China Series F: Information Sciences, 48 (1): 117-124 (2005)Calibration method for line-structured light multi-vision sensor based on combined target., , and . EURASIP J. Wireless Comm. and Networking, (2013)On the Security of the Canetti-Krawczyk Model., , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 356-363. Springer, (2005)