Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance analysis of network coding for multicast relay system over Nakagami-m fading channels., , and . SCIENCE CHINA Information Sciences, 54 (11): 2338-2348 (2011)SafeSky: A Secure Cloud Storage Middleware for End-User Applications., , , and . SRDS, page 21-30. IEEE Computer Society, (2015)Multi-Document Extractive Summarization Using Window-Based Sentence Representation., , and . SSCI, page 404-410. IEEE, (2015)DeepReID: Deep Filter Pairing Neural Network for Person Re-identification., , , and . CVPR, page 152-159. IEEE Computer Society, (2014)Principles of IEEE 802.11s., , , , and . ICCCN, page 1002-1007. IEEE, (2007)The Highly Insidious Extreme Phishing Attacks., , , , , , , and . ICCCN, page 1-10. IEEE, (2016)Secrecy performance of transmit antenna selection with outdated CSI for MIMO relay systems., , , and . ICC Workshops, page 272-277. IEEE, (2016)Distributional sentence representation by expert knowledge for causal relation identification., , and . ICICS, page 1-5. IEEE, (2015)A New Probabilistic Kernel Factor Analysis for Multisensory Data Fusion: Application to Tool Condition Monitoring., , , , and . IEEE Trans. Instrumentation and Measurement, 65 (11): 2527-2537 (2016)Field microclimate monitoring system based on wireless sensor network., , , , , , and . Journal of Intelligent and Fuzzy Systems, 35 (2): 1325-1337 (2018)