Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly Intrusion Detection Approach Using Hybrid MLP/CNN Neural Network., , , and . ISDA (2), page 1095-1102. IEEE Computer Society, (2006)Fault-tolerant routing mechanism based on network coding in wireless mesh networks., , , and . J. Network and Computer Applications, (2014)New approaching condition for sliding mode control design with Lipschitz switching surface., , and . Science in China Series F: Information Sciences, 52 (11): 2032-2044 (2009)Analysis and design of linear time-varying systems based on a finite-time performance index., , , , and . ACC, page 5948-5953. IEEE, (2015)A New Node Role-Based Reputation Model in Hierarchical Ad Hoc Networks., , , , , and . NCM, page 457-461. IEEE Computer Society, (2009)The Best Combining of Classifiers with Prior Probabilities., , and . MLDM Posters, page 104-114. IBaI Publishing, (2009)Almost as good as single-hop full-duplex: bidirectional end-to-end known interference cancellation., , , , , and . ICC, page 1932-1937. IEEE, (2015)Detection performance of spatial-frequency diversity MIMO radar., , , and . IEEE Trans. Aerospace and Electronic Systems, 50 (4): 3137-3155 (2014)Modelling, analysis and containment of passive worms in P2P networks., , , , and . IJIPT, 8 (2/3): 130-142 (2014)Robust attitude control of a 3DOF helicopter with multi-operation points., and . J. Systems Science & Complexity, 22 (2): 207-219 (2009)