Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A combined optimization method for solving the inverse kinematics problems of mechanical manipulators., and . IEEE Trans. Robotics and Automation, 7 (4): 489-499 (1991)A fast multilayer neural-network training algorithm based on the layer-by-layer optimizing procedures., and . IEEE Trans. Neural Networks, 7 (3): 768-775 (1996)Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks., , and . J. Sensors, (2015)A Private Escrow Protocol for Internet Will System Design., , , and . IBICA, page 361-366. IEEE Computer Society, (2011)Trace Element Characteristics of Ultramafic Xenoliths in Basaltic Rocks from Penghu Islands, Taiwan., , , , , , , and . ICFCE, volume 133 of Advances in Intelligent and Soft Computing, page 691-699. Springer, (2011)Steganalysis of AMR Speech Based on Multiple Classifiers Combination., , , , and . IEEE Access, (2019)TSIA: A Novel Image Authentication Scheme for AMBTC-Based Compressed Images Using Turtle Shell Based Reference Matrix., , , and . IEEE Access, (2019)Locality Sensitive Discriminative Unsupervised Dimensionality Reduction., , , , and . Symmetry, 11 (8): 1036 (2019)An Effective Dual-Image Reversible Hiding for UAV's Image Communication., , and . Symmetry, 10 (7): 271 (2018)VarioWatch: providing large-scale and comprehensive annotations on human genomic variants in the next generation sequencing era., , , , , , , , , and 1 other author(s). Nucleic Acids Research, 40 (Web-Server-Issue): 76-81 (2012)