Author of the publication

Optical code scrambling technique for security enhancing in optical stealth system.

, , , , , and . WOCC, page 1-4. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Fang, Tao
add a person with the name Fang, Tao
 

Other publications of authors with the same name

Provably Secure and Efficient ID-Based Strong Designated Verifier Signature Scheme with Message Recovery., and . NBiS, page 287-293. IEEE Computer Society, (2014)Optical steganographic transmission of spectral-phase-encoded OCDMA signal over a public DPSK channel., , , , , , and . WOCC, page 552-554. IEEE, (2013)A Distributed Node Localization Scheme for Wireless Sensor Networks., , , and . Wireless Personal Communications, 53 (1): 15-33 (2010)Data Fusion Using Improved Dempster-Shafer Evidence Theory for Vehicle Detection., , and . FSKD (1), page 487-491. IEEE Computer Society, (2007)Multiple dynamic range image coding for wireless sensor networks., , , and . SMC, page 2944-2949. IEEE, (2008)A Novel Texture-Preceded Segmentation Algorithm for High-Resolution Imagery., , and . IEEE Trans. Geoscience and Remote Sensing, 48 (7): 2818-2828 (2010)A novel resynchronization marker positioning approach for robust video transmission., and . ISCAS (3), page 801-804. IEEE, (2004)Supervised Adaptive Incremental Clustering for data stream of chunks., , , and . Neurocomputing, (2017)Person Re-Identification Based on DropEasy Method., , , and . IEEE Access, (2019)Stability Analysis of Complex-Valued Nonlinear Differential System., and . J. Applied Mathematics, (2013)