Author of the publication

Research on protection of vulnerable nodes in power communication network based on the model of invalid proximity of edge.

, , , , and . Int. J. Auton. Adapt. Commun. Syst., 14 (4): 354-370 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Personalized Recommendation on Sparse Data., and . IEEE Trans. Knowl. Data Eng., 25 (12): 2895-2899 (2013)Improved Codebook Edge Detection., , and . CVGIP: Graphical Model and Image Processing, 57 (6): 533-536 (1995)Schedule refinement for homogeneous multi-core processors in the presence of manufacturing-caused heterogeneity., , , , and . Frontiers of IT & EE, 16 (12): 1018-1033 (2015)Sensors' optimal dimensionality compression matrix in estimation fusion., , and . Automatica, 41 (12): 2131-2139 (2005)Efficient Motion Vector Interpolation for Error Concealment of H.264/AVC., , and . TBC, 57 (1): 75-80 (2011)Corrections to "Efficient Motion Vector Interpolation for Error Concealment of H.264/AVC" Mar 11 75-80., , and . TBC, 57 (2): 326 (2011)Self-calibration of spherical rectification for a PTZ-stereo system., and . Image Vision Comput., 28 (3): 367-375 (2010)Minimax Robust Optimal Estimation Fusion in Distributed Multisensor Systems With Uncertainties., , , and . IEEE Signal Process. Lett., 17 (9): 811-814 (2010)Reconstruction of the Visual Hull with Modified Ray-tracing and Fast Slice-based Surface Extraction., , and . ICYCS, page 907-912. IEEE Computer Society, (2008)Kinship verification in the wild: The first kinship verification competition., , , , , , , , , and . IJCB, page 1-6. IEEE, (2014)