Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Micro-Doppler extraction from ballistic missile radar returns using time-frequency analysis., , , and . ISWCS, page 780-784. IEEE, (2010)Improvement of Green-Hohenberger Adaptive Oblivious Transfer: A Review., and . I. J. Network Security, 17 (4): 454-462 (2015)Normalizing rank aggregation method for priority of a fuzzy preference relation and its effectiveness., , and . Int. J. Approx. Reasoning, 50 (8): 1287-1297 (2009)Pseudo-Maximum Likelihood Estimation of ballistic missile precession frequency., , , and . Signal Processing, 92 (9): 2018-2028 (2012)Research on E-government Date Encryption Model., and . ICEE, page 4378-4381. IEEE, (2010)Ballistic missile detection via micro-Doppler frequency estimation from radar return., , , , and . Digital Signal Processing, 22 (1): 87-95 (2012)Perceptually Transparent Information Hiding in G.729 Bitstream., , , and . IIH-MSP, page 406-409. IEEE Computer Society, (2008)Analyzing the Impact of OWOM on Box Office Revenue in the World of Big Data., , , and . BigMM, page 166-169. IEEE Computer Society, (2016)On Two Kinds of Flaws in Some Server-Aided Verification Schemes., , and . I. J. Network Security, 18 (6): 1054-1059 (2016)A Constant-Current Transmission Converter for Semi-airborne Transient Electromagnetic Surveying., , , , , , and . IEEE Trans. Industrial Electronics, 67 (1): 542-550 (2020)